The pTsin lentiviral expression vector was used to generate lentiviral plasmids for Tsin-NFAT1, which could stably overexpress NFAT1 in cells as previously reported [20 (link)]. Lipofectamine 2000 was used to transfect 293 T cells with the pTsin expression plasmid and viral packaging plasmids (pHR’ CMVδ 9.8 and pVSV-G). Twenty-four hours after transfection, the medium was replaced with fresh DMEM, containing 10% FBS and 1 mM of sodium pyruvate. Next, 48 h post transfection, the virus culture medium was collected and added to renal cancer cells supplemented with 12 μg/ml of polybrene. Twenty-four hours after infection, the infected cells were selected with 10 μg/ml of puromycin.
Lentivirus based small hairpin rnas shrna
Lentivirus-based small hairpin RNAs (shRNA) are a type of laboratory equipment used for gene silencing. They are viral vectors that can be used to deliver short hairpin RNA sequences into target cells, leading to the suppression of gene expression through RNA interference (RNAi) mechanisms.
Lab products found in correlation
2 protocols using lentivirus based small hairpin rnas shrna
Lentiviral shRNA and Overexpression in Cancer Cells
The pTsin lentiviral expression vector was used to generate lentiviral plasmids for Tsin-NFAT1, which could stably overexpress NFAT1 in cells as previously reported [20 (link)]. Lipofectamine 2000 was used to transfect 293 T cells with the pTsin expression plasmid and viral packaging plasmids (pHR’ CMVδ 9.8 and pVSV-G). Twenty-four hours after transfection, the medium was replaced with fresh DMEM, containing 10% FBS and 1 mM of sodium pyruvate. Next, 48 h post transfection, the virus culture medium was collected and added to renal cancer cells supplemented with 12 μg/ml of polybrene. Twenty-four hours after infection, the infected cells were selected with 10 μg/ml of puromycin.
Lentiviral Transduction for shRNA Screening
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!