{"id":37,"date":"2018-07-14T19:48:34","date_gmt":"2018-07-15T02:48:34","guid":{"rendered":"http:\/\/blogs.reed.edu\/bytes-of-the-apple\/?p=37"},"modified":"2018-07-14T19:48:34","modified_gmt":"2018-07-15T02:48:34","slug":"cg-and-flapwing-creating-clones-using-synthetic-vectors","status":"publish","type":"post","link":"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/2018\/07\/14\/cg-and-flapwing-creating-clones-using-synthetic-vectors\/","title":{"rendered":"CG and Flapwing: creating clones using synthetic vectors"},"content":{"rendered":"<p><span style=\"font-weight: 400\">One way we intend to examine the role of our target proteins, CG and Flapwing (flw) is by RNA interference knockdown (RNAi, in which the target proteins are inhibited in live cells, those cells exposed to the apical constriction signaling ligand, Fog, and the cells fixed so their response may be quantified. But in addition to knockdown, we also plan to measure target overexpression and localization. To these ends, we will use recombinant DNA techniques to produce clones of our target proteins\u2019 coding sequences, in the form of a synthetic vector.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">The process of producing a vector applicable to the proteins of interest first requires that template DNA of both targets are amplified by polymerase chain reaction (PCR). Once the DNA has been scaled up, it is precipitated and resuspended in water before being \u201cdigested\u201d by two specialized restriction enzymes that sever the DNA at specific locations in sequences artificially inserted into the coding gene for the target proteins.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-38\" src=\"http:\/\/blogs.reed.edu\/bytes-of-the-apple\/files\/2018\/07\/restriction-figure-300x218.png\" alt=\"\" width=\"300\" height=\"218\" srcset=\"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/files\/2018\/07\/restriction-figure-300x218.png 300w, https:\/\/blogs.reed.edu\/bytes-of-the-apple\/files\/2018\/07\/restriction-figure.png 439w\" sizes=\"auto, (max-width: 300px) 85vw, 300px\" \/><\/p>\n<p><span style=\"font-weight: 400\">Because the cleavage sites on any two antiparallel sites cut by the same restriction enzyme will be complimentary, it is possible to place complimentary cut sites on both our insert and a cloning vector (pMT\/V5-His A), thus allowing the cloning vector\u2019s cut ends to match to the cut ends of our insert and for the two to bind. The process of combining vector and insert and encouraging them to bind and circularize is known as ligation.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Once ligation is complete and the insert DNA has been successfully added to the vector, the product is introduced to a bacterial culture and allowed to propagate before the culture is spun down by centrifuge and the DNA is isolated, for further use in increasing the expression of our target proteins in cell culture.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone  wp-image-44\" src=\"http:\/\/blogs.reed.edu\/bytes-of-the-apple\/files\/2018\/07\/less-shit-cloning-diagram-300x140.png\" alt=\"\" width=\"460\" height=\"215\" srcset=\"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/files\/2018\/07\/less-shit-cloning-diagram-300x140.png 300w, https:\/\/blogs.reed.edu\/bytes-of-the-apple\/files\/2018\/07\/less-shit-cloning-diagram-768x358.png 768w, https:\/\/blogs.reed.edu\/bytes-of-the-apple\/files\/2018\/07\/less-shit-cloning-diagram-1024x478.png 1024w, https:\/\/blogs.reed.edu\/bytes-of-the-apple\/files\/2018\/07\/less-shit-cloning-diagram-1200x560.png 1200w, https:\/\/blogs.reed.edu\/bytes-of-the-apple\/files\/2018\/07\/less-shit-cloning-diagram.png 1323w\" sizes=\"auto, (max-width: 460px) 85vw, 460px\" \/><\/p>\n<p><span style=\"font-weight: 400\">Due to difficulties with the cloning procedures, we are still currently attempting to successfully force the vector to take up the insert and vectorize the genes of our target proteins, which is necessary to introduce this increased protein expression into cell cultures. We have as such added CIP to the PMT His-A digestions, which prevents the vector from re-forming with itself and requires the binding of the insert for the DNA to circularize, and are expecting better results from our ligations in the future.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400\">References:<\/span><\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Molecular Cell Biology. 4th edition. Lodish H, Berk A, Zipursky SL, et al. New York: W.H. Freeman; 2000<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Thermo Fisher Scientific (2018). Traditional Cloning Basics | Thermo Fisher Scientific &#8211; US.<\/span><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>One way we intend to examine the role of our target proteins, CG and Flapwing (flw) is by RNA interference knockdown (RNAi, in which the target proteins are inhibited in live cells, those cells exposed to the apical constriction signaling ligand, Fog, and the cells fixed so their response may be quantified. But in addition &hellip; <a href=\"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/2018\/07\/14\/cg-and-flapwing-creating-clones-using-synthetic-vectors\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;CG and Flapwing: creating clones using synthetic vectors&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1815,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-37","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/wp-json\/wp\/v2\/posts\/37","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/wp-json\/wp\/v2\/users\/1815"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":2,"href":"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/wp-json\/wp\/v2\/posts\/37\/revisions"}],"predecessor-version":[{"id":45,"href":"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/wp-json\/wp\/v2\/posts\/37\/revisions\/45"}],"wp:attachment":[{"href":"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/wp-json\/wp\/v2\/media?parent=37"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/wp-json\/wp\/v2\/categories?post=37"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.reed.edu\/bytes-of-the-apple\/wp-json\/wp\/v2\/tags?post=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}