Transient transfections were performed using Lipofectamine 2000 reagent from Invitrogen according to the manufacturer’s instructions. The lentiviral stocks were prepared according to previous report [19 (link)]. Briefly, the plasmid carrying the Sufu-shRNA and three packaging plasmids were co-transfected into 293T cells using Lipofectamine 2000. The viruses were harvested 24 h post transfection and 4 ml viruses were used for infected NIH-3T3 cells seeded in 10-cm dishes. Infected cells were analyzed 5–7 days post infection by western blot analyses of the expression of Sufu.
Lentiviral-Mediated Knockdown of Sufu in NIH-3T3 Cells
Transient transfections were performed using Lipofectamine 2000 reagent from Invitrogen according to the manufacturer’s instructions. The lentiviral stocks were prepared according to previous report [19 (link)]. Briefly, the plasmid carrying the Sufu-shRNA and three packaging plasmids were co-transfected into 293T cells using Lipofectamine 2000. The viruses were harvested 24 h post transfection and 4 ml viruses were used for infected NIH-3T3 cells seeded in 10-cm dishes. Infected cells were analyzed 5–7 days post infection by western blot analyses of the expression of Sufu.
Corresponding Organization :
Other organizations : Fudan University, Shanghai Institute of Materia Medica, Chinese Academy of Sciences
Variable analysis
- Gli2ΔN plasmid
- ShhN plasmids
- Myc-DKK-tagged ORF clone of Homo sapiens Smo plasmid
- Mutant human plasmid SmoM2 (W535L)
- Sufu-shRNA
- Luciferase reporter activity (8 × GBS-luciferase, TCF/LEF-luciferase, NF-κB-luciferase)
- TK-Renilla luciferase plasmid
- Positive control: Not explicitly mentioned.
- Negative control: Not explicitly mentioned.
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!