The largest database of trusted experimental protocols

Px458 crispr cas9 vector

Manufactured by Addgene
Sourced in United States

Px458 is a CRISPR/Cas9 vector that enables the expression of Cas9 and a guide RNA. It can be used for gene editing applications.

Automatically generated - may contain errors

2 protocols using px458 crispr cas9 vector

1

CRISPR-Cas9 Editing of Mouse Hoip Gene

Check if the same lab product or an alternative is used in the 5 most similar protocols
The 5′-AGGAGCTGGCGAGCGCCCTGAGG-3′ nucleotide sequences in exon 1 of the mouse Hoip gene were selected as the targets. Double-stranded target DNAs were prepared by annealing synthesized oligo DNAs, and then incorporated into the BbsI site of the px458 CRISPR/Cas9 vector (Addgene, Watertown, MA, USA). Each plasmid was transiently introduced into Neuro2a cells, and 2 days after transfection, the GFP positive cells were sorted by a FACSAria IIIu (BD Biosciences, San Jose, CA, USA). Single clones were obtained by limiting dilution. Genome editing of the Hoip gene was confirmed by genome sequencing and immunoblotting.
+ Open protocol
+ Expand
2

Nestin Knockout and Lamin A/C Rescue

Check if the same lab product or an alternative is used in the 5 most similar protocols
The first coding exon of Nestin was selected for gRNA design. CRISPRs were designed at http://crispr.mit.edu, as provided by the Zhang laboratory and cloned into the pX458 CRISPR/Cas9 vector (Addgene). The sequences used to clone the G1, G2, and G3 gRNAs were presented in Supplementary Figure 2. Two days after H1299 cells were transfected with control (Cas9-GFP) and Nestin-knockout (G2-Cas9-GFP) plasmids, those expressing GFP were sorted using an Influx Cell Sorter (BD, USA) and cultured on 12-well plates. Twenty-four hours later, half of the Nestin-knockout cells were transfected with GFP-lamin A/C. The cells were then cultured for 3 days and harvested for further experiments.
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!