Team:UANL Mty-Mexico/project/The Whole Scheme
From 2014.igem.org
JuanQuijano (Talk | contribs) |
|||
(One intermediate revision not shown) | |||
Line 65: | Line 65: | ||
<br>The DNA suppression system we chose makes use of TALENs and ZFNs [2]. Both, TALENs and ZFNs, are engineered proteins able to recognize specific sequences and bind to them. A nuclease attached to the binding domain then is capable to cause a nick in the DNA. If coupled strategically, these proteins can be used to digest the DNA as restriction enzymes. | <br>The DNA suppression system we chose makes use of TALENs and ZFNs [2]. Both, TALENs and ZFNs, are engineered proteins able to recognize specific sequences and bind to them. A nuclease attached to the binding domain then is capable to cause a nick in the DNA. If coupled strategically, these proteins can be used to digest the DNA as restriction enzymes. | ||
- | After we joined the delivery and the suppression systems, the whole scheme ended as shown in Figure 1. Plasmids containing TALEN/ZFN sites must be used to program organisms intended to be released into the environment. If any organisms shall be hacked, the first step would be to generate a bacteriophage solution in the laboratory. This solution will contain the bacteriophages at the required concentration, and the bacteriophages themselves will contain a phagemid with the appropriate TALEN/ZFN gene and the new program, if any. | + | After we joined the delivery and the suppression systems, the whole scheme ended as shown in Figure 1. Plasmids containing TALEN/ZFN sites must be used to program organisms intended to be released into the environment. If any organisms shall be hacked, the first step would be to generate a bacteriophage solution in the laboratory. This solution will contain the bacteriophages at the required concentration, and the bacteriophages themselves will contain a phagemid with the appropriate TALEN/ZFN gene and the new program, if any.<br> |
+ | |||
+ | |||
+ | |||
+ | In our case, fluorescent proteins were selected to represent the programs and monitor the hacking process (Figure 1B). Variable reporters can be used to monitor the hacking process in situ. | ||
+ | |||
+ | <p align="center"> | ||
+ | <img src="https://static.igem.org/mediawiki/2014/3/38/10744174_879797122032203_704072764_o.jpg" height="400px" /></p> | ||
+ | |||
+ | <p align="center"> | ||
+ | <img src="https://static.igem.org/mediawiki/2014/0/09/10726665_879797142032201_1596689707_n.jpg" height="500px"/></p> | ||
+ | |||
- | |||
<br> | <br> |
Latest revision as of 03:54, 18 October 2014
Project |
|
The Whole Scheme In order to be able to hack the genetic programming of a biological system, we need two main tools: i) a DNA delivery system and ii) a DNA suppression system. Both, the delivery and the supression systems should be very specific so that other organisms can not be damaged.
References
|