AAV vectors were cloned by Gibson assembly (NEB) using NEB Stable Competent E. coli (High Efficiency) to insert the sgRNA sequence and C-terminal base editor half of ABE8e-SpyMac into v5 Cbh-AAV-ABE-NpuC+U6-sgRNA (Addgene 137177), and the N-terminal base editor half and a second U6-sgRNA cassette into v5 Cbh-AAV-ABE-NpuN (Addgene 137178)(74 (link)).
Plasmid Construction and AAV Cloning
AAV vectors were cloned by Gibson assembly (NEB) using NEB Stable Competent E. coli (High Efficiency) to insert the sgRNA sequence and C-terminal base editor half of ABE8e-SpyMac into v5 Cbh-AAV-ABE-NpuC+U6-sgRNA (Addgene 137177), and the N-terminal base editor half and a second U6-sgRNA cassette into v5 Cbh-AAV-ABE-NpuN (Addgene 137178)(74 (link)).
Corresponding Organization : Howard Hughes Medical Institute
Other organizations : The Ohio State University Wexner Medical Center, University of Massachusetts Chan Medical School, Massachusetts Institute of Technology, University of Missouri
Variable analysis
- Deaminase and Cas-protein domains replaced in the p2T-CMV-ABE7.10-BlastR plasmid
- SgRNA sequences cloned into the SpCas9-hairpin U6 sgRNA expression plasmid
- SgRNA sequences and gene-specific primers used for amplification and HTS
- Not explicitly mentioned
- Mach1 chemically competent E. coli used for plasmid transformation
- LB agar plates and LB broth used for bacterial growth
- Ampicillin (100 μg/mL) used for bacterial selection
- Templiphi rolling circle amplification and Sanger sequencing used for plasmid validation
- NEB Stable Competent E. coli (High Efficiency) used for AAV vector cloning
- Not explicitly mentioned
- Not explicitly mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!