Team:UANL Mty-Mexico/project/The Whole Scheme
From 2014.igem.org
JuanQuijano (Talk | contribs) |
|||
(3 intermediate revisions not shown) | |||
Line 65: | Line 65: | ||
<br>The DNA suppression system we chose makes use of TALENs and ZFNs [2]. Both, TALENs and ZFNs, are engineered proteins able to recognize specific sequences and bind to them. A nuclease attached to the binding domain then is capable to cause a nick in the DNA. If coupled strategically, these proteins can be used to digest the DNA as restriction enzymes. | <br>The DNA suppression system we chose makes use of TALENs and ZFNs [2]. Both, TALENs and ZFNs, are engineered proteins able to recognize specific sequences and bind to them. A nuclease attached to the binding domain then is capable to cause a nick in the DNA. If coupled strategically, these proteins can be used to digest the DNA as restriction enzymes. | ||
- | After we joined the delivery and the suppression systems, the whole scheme ended as shown in Figure 1. Plasmids containing TALEN/ZFN sites must be used to program organisms intended to be released into the environment. If any organisms shall be hacked, the first step would be to generate a bacteriophage solution in the laboratory. This solution will contain the bacteriophages at the required concentration, and the bacteriophages themselves will contain a phagemid with the appropriate TALEN/ZFN gene and the new program, if any. | + | After we joined the delivery and the suppression systems, the whole scheme ended as shown in Figure 1. Plasmids containing TALEN/ZFN sites must be used to program organisms intended to be released into the environment. If any organisms shall be hacked, the first step would be to generate a bacteriophage solution in the laboratory. This solution will contain the bacteriophages at the required concentration, and the bacteriophages themselves will contain a phagemid with the appropriate TALEN/ZFN gene and the new program, if any.<br> |
- | |||
+ | |||
+ | In our case, fluorescent proteins were selected to represent the programs and monitor the hacking process (Figure 1B). Variable reporters can be used to monitor the hacking process in situ. | ||
+ | |||
+ | <p align="center"> | ||
+ | <img src="https://static.igem.org/mediawiki/2014/3/38/10744174_879797122032203_704072764_o.jpg" height="400px" /></p> | ||
+ | |||
+ | <p align="center"> | ||
+ | <img src="https://static.igem.org/mediawiki/2014/0/09/10726665_879797142032201_1596689707_n.jpg" height="500px"/></p> | ||
+ | |||
+ | |||
+ | |||
+ | <br> | ||
+ | <p align="justify"><b><font color="black" size="5px">References</font></b> | ||
+ | <br> | ||
+ | [1] Kittleson JT, DeLoache W, Cheng HY, Anderson JC. (2012) Scalable Plasmid Transfer using Engineered P1-based Phagemids. ACS Synth Biol. 1:583-9. | ||
+ | <br>[2] Strauβ A, Lahaye T. (2013) Zinc fingers, TAL effectors, or Cas9-based DNA binding proteins: what's best for targeting desired genome loci? Mol Plant. 6:1384-7. | ||
+ | </p> | ||
</td> | </td> | ||
Line 74: | Line 90: | ||
</tr> | </tr> | ||
</table> | </table> | ||
+ | |||
+ | |||
Latest revision as of 03:54, 18 October 2014
Project |
|
The Whole Scheme In order to be able to hack the genetic programming of a biological system, we need two main tools: i) a DNA delivery system and ii) a DNA suppression system. Both, the delivery and the supression systems should be very specific so that other organisms can not be damaged.
References
|