Conditional Pten Inactivation in Mouse
Partial Protocol Preview
This section provides a glimpse into the protocol.
The remaining content is hidden due to licensing restrictions, but the full text is available at the following link:
Access Free Full Text.
Corresponding Organization : Kettering University
Other organizations : Keck Graduate Institute, University of Southern California, Baylor College of Medicine
Protocol cited in 32 other protocols
Variable analysis
- Targeting construct linearized with NotI and electroporated into CJ7 ES cells
- Pten loxP-neo/+ mice mated with EIIA-Cre transgenic mice
- Pten loxP/loxP mice mated with PB-Cre transgenic mice or PB-Cre4 transgenic mice
- Transfectants selected in G418 and gancyclovir and expanded for Southern blot analysis
- Chimeric mice produced by microinjection of targeted ES cell clones into E3.5 C57BL6/J blastocysts
- Germline transmission of the mutant allele verified by Southern blot analysis of tail DNA from agouti coat-colored F1 offspring
- Mosaic mice harboring Pten wild-type allele, Pten targeted allele (Pten loxP-neo), and floxed allele (Pten loxp) in their germline
- Tail DNA from offspring subjected to Southern blot analysis using probe 6.1 and PCR analysis using primers 1, 2, and 3
- Pten probe containing exons 4-6 used to screen mouse 129/Sv genomic library
- CJ7 ES cells used for electroporation of targeting construct
- C57BL6/J blastocysts used for microinjection of targeted ES cell clones
- C57BL6/J females used for mating of chimeric males
- Probe 6.1 used for Southern blot analysis of tail DNA
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!