Genomic DNA was extracted from the clipped tails of mice by Proteinase K lysis buffer as previously described42 (link). The genetic status of each mouse was determined from the genome analysis of the twitcher mutation, as reported in ref. 31 (link). TWI male mice at P30 and P15 and their WT male littermates were used for experiments, while the TWI-Het littermates for the TWI colony maintenance31 (link), 42 (link). Surgical procedures for fixation were performed under urethane anesthesia (Sigma, 0.8 ml/hg), and all efforts were made to minimize mice suffering.
Twitcher Mouse Genotyping and Surgical Procedures
Genomic DNA was extracted from the clipped tails of mice by Proteinase K lysis buffer as previously described42 (link). The genetic status of each mouse was determined from the genome analysis of the twitcher mutation, as reported in ref. 31 (link). TWI male mice at P30 and P15 and their WT male littermates were used for experiments, while the TWI-Het littermates for the TWI colony maintenance31 (link), 42 (link). Surgical procedures for fixation were performed under urethane anesthesia (Sigma, 0.8 ml/hg), and all efforts were made to minimize mice suffering.
Corresponding Organization : Italian Institute of Technology
Other organizations : Istituto Nanoscienze, Scuola Normale Superiore
Protocol cited in 330 other protocols
Variable analysis
- Genotype: Twi+/- C57BL6 mice vs. WT male littermates
- Not explicitly mentioned
- Mice age: P30 and P15
- Sex: Male mice
- Anesthesia: Urethane
- Positive control: WT male littermates
- Negative control: Not mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!