Team:UANL Mty-Mexico/project/The Whole Scheme
From 2014.igem.org
JuanQuijano (Talk | contribs) |
|||
(2 intermediate revisions not shown) | |||
Line 65: | Line 65: | ||
<br>The DNA suppression system we chose makes use of TALENs and ZFNs [2]. Both, TALENs and ZFNs, are engineered proteins able to recognize specific sequences and bind to them. A nuclease attached to the binding domain then is capable to cause a nick in the DNA. If coupled strategically, these proteins can be used to digest the DNA as restriction enzymes. | <br>The DNA suppression system we chose makes use of TALENs and ZFNs [2]. Both, TALENs and ZFNs, are engineered proteins able to recognize specific sequences and bind to them. A nuclease attached to the binding domain then is capable to cause a nick in the DNA. If coupled strategically, these proteins can be used to digest the DNA as restriction enzymes. | ||
- | After we joined the delivery and the suppression systems, the whole scheme ended as shown in Figure 1. Plasmids containing TALEN/ZFN sites must be used to program organisms intended to be released into the environment. If any organisms shall be hacked, the first step would be to generate a bacteriophage solution in the laboratory. This solution will contain the bacteriophages at the required concentration, and the bacteriophages themselves will contain a phagemid with the appropriate TALEN/ZFN gene and the new program, if any. | + | After we joined the delivery and the suppression systems, the whole scheme ended as shown in Figure 1. Plasmids containing TALEN/ZFN sites must be used to program organisms intended to be released into the environment. If any organisms shall be hacked, the first step would be to generate a bacteriophage solution in the laboratory. This solution will contain the bacteriophages at the required concentration, and the bacteriophages themselves will contain a phagemid with the appropriate TALEN/ZFN gene and the new program, if any.<br> |
- | |||
- | </ | + | In our case, fluorescent proteins were selected to represent the programs and monitor the hacking process (Figure 1B). Variable reporters can be used to monitor the hacking process in situ. |
+ | |||
+ | <p align="center"> | ||
+ | <img src="https://static.igem.org/mediawiki/2014/3/38/10744174_879797122032203_704072764_o.jpg" height="400px" /></p> | ||
+ | |||
+ | <p align="center"> | ||
+ | <img src="https://static.igem.org/mediawiki/2014/0/09/10726665_879797142032201_1596689707_n.jpg" height="500px"/></p> | ||
+ | |||
- | |||
- | |||
<br> | <br> | ||
Line 81: | Line 85: | ||
<br>[2] Strauβ A, Lahaye T. (2013) Zinc fingers, TAL effectors, or Cas9-based DNA binding proteins: what's best for targeting desired genome loci? Mol Plant. 6:1384-7. | <br>[2] Strauβ A, Lahaye T. (2013) Zinc fingers, TAL effectors, or Cas9-based DNA binding proteins: what's best for targeting desired genome loci? Mol Plant. 6:1384-7. | ||
</p> | </p> | ||
+ | |||
+ | </td> | ||
+ | |||
+ | </tr> | ||
+ | </table> | ||
+ | |||
+ | |||
Latest revision as of 03:54, 18 October 2014
Project |
|
The Whole Scheme In order to be able to hack the genetic programming of a biological system, we need two main tools: i) a DNA delivery system and ii) a DNA suppression system. Both, the delivery and the supression systems should be very specific so that other organisms can not be damaged.
References
|