The largest database of trusted experimental protocols

Stealth rna interference

Manufactured by Thermo Fisher Scientific

Stealth RNA interference is a laboratory tool designed to facilitate the selective silencing of target genes. It functions by introducing small interfering RNA (siRNA) molecules into cells, which can then induce the degradation of specific mRNA transcripts, thereby reducing the expression of the corresponding genes.

Automatically generated - may contain errors

2 protocols using stealth rna interference

1

siRNA-mediated Knockdown in HeLa Cells

Check if the same lab product or an alternative is used in the 5 most similar protocols
siRNAs were synthesized at Thermo Fisher Scientific (Stealth RNA interference) or Hokkaido System Science. Target sequences were as follows: 5′-GCAUUACAACCAGACAGUUGAUAUU-3′ (p38α), 5′-CCAGUAUGAAUUUCCCAACCCAGAA-3′ (MK2), 5′-UGGAGUCCAUCAAGAUGCAGCAGUA-3′ (EphA2 #1), 5′-GCAAGGAAGUGGUACUGCUGGACUU-3′ (EphA2 #2) and 5′-UAAUGUACUGCGCGUGGAGAGGAA-3′ (negative control). HeLa cells were transfected with siRNAs at a final concentration of 20 to 100 nM using Lipofectamine RNAiMAX (Thermo Fisher Scientific) in accordance with the manufacturer’s instructions.
+ Open protocol
+ Expand
2

NUDT21 Knockdown in HeLa Cells

Check if the same lab product or an alternative is used in the 5 most similar protocols
Knockdown of NUDT21 was achieved with the use of Stealth RNA interference (Thermo Fisher Scientific). HeLa S3 cells were transfected with siRNA oligonucleotides with the use of the Lipofectamine RNAiMAX reagent (Thermo Fisher siRNA (Thermo Fisher Scientific, catalog no. 12935300) was also used.
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!