JoVE Visualize What is visualize?
Related JoVE Video
 
Pubmed Article
An in vitro system for studying murid herpesvirus-4 latency and reactivation.
PLoS ONE
PUBLISHED: 05-04-2010
The narrow species tropisms of Epstein-Barr Virus (EBV) and the Kaposis Sarcoma -associated Herpesvirus (KSHV) have made Murid Herpesvirus-4 (MuHV-4) an important tool for understanding how gammaherpesviruses colonize their hosts. However, while MuHV-4 pathogenesis studies can assign a quantitative importance to individual genes, the complexity of in vivo infection can make the underlying mechanisms hard to discern. Furthermore, the lack of good in vitro MuHV-4 latency/reactivation systems with which to dissect mechanisms at the cellular level has made some parallels with EBV and KSHV hard to draw. Here we achieved control of the MuHV-4 lytic/latent switch in vitro by modifying the 5 untranslated region of its major lytic transactivator gene, ORF50. We terminated normal ORF50 transcripts by inserting a polyadenylation signal and transcribed ORF50 instead from a down-stream, doxycycline-inducible promoter. In this way we could establish fibroblast clones that maintained latent MuHV-4 episomes without detectable lytic replication. Productive virus reactivation was then induced with doxycycline. We used this system to show that the MuHV-4 K3 gene plays a significant role in protecting reactivating cells against CD8(+) T cell recognition.
Authors: Sara Dolatshahi Pirooz, Joo-Hyung Lee, Zhen Zhao, Duojiao Ni, Soohwan Oh, Chengyu Liang.
Published: 11-22-2011
ABSTRACT
γ-Herpesviruses (γ-HVs) are notable for their ability to establish latent infections of lymphoid cells1. The narrow host range of human γ-HVs, such as EBV and KSHV, has severely hindered detailed pathogenic studies. Murine γ-herpesvirus 68 (γHV68) shares extensive genetic and biological similarities with human γ-HVs and is a natural pathogen of murid rodents2. As such, evaluation of γHV68 infection of mice inbred strains at different stages of viral infection provides an important model for understanding viral lifecycle and pathogenesis during γ-HVs infection. Upon intranasal inoculation, γHV68 infection results in acute viremia in the lung that is later resolved into a latent infection of splenocytes and other cells, which may be reactivated throughout the life of the host3,4. In this protocol, we will describe how to use the plaque assay to assess infectious virus titer in the lung homogenates on Vero cell monolayers at the early stage (5 - 7 days) of post-intranasal infection (dpi). While acute infection is largely cleared 2 - 3 weeks postinfection, a latent infection of γHV68 is established around 14 dpi and maintained later on in the spleen of the mice. Latent infection usually affects a very small population of cells in the infected tissues, whereby the virus stays dormant and shuts off most of its gene expression. Latently-infected splenocytes spontaneously reactivate virus upon explanting into tissue culture, which can be recapitulated by an infectious center (IC) assay to determine the viral latent load. To further estimate the amount of viral genome copies in the acutely and/or latently infected tissues, quantitative real-time PCR (qPCR) is used for its maximal sensitivity and accuracy. The combined analyses of the results of qPCR and plaque assay, and/or IC assay will reveal the spatiotemporal profiles of viral replication and infectivity in vivo.
17 Related JoVE Articles!
Play Button
A Primary Neuron Culture System for the Study of Herpes Simplex Virus Latency and Reactivation
Authors: Mariko Kobayashi, Ju-Youn Kim, Vladimir Camarena, Pamela C. Roehm, Moses V. Chao, Angus C. Wilson, Ian Mohr.
Institutions: New York University School of Medicine, New York University School of Medicine, New York University School of Medicine, New York University School of Medicine, New York University School of Medicine, New York University School of Medicine, New York University School of Medicine.
Herpes simplex virus type-1 (HSV-1) establishes a life-long latent infection in peripheral neurons. This latent reservoir is the source of recurrent reactivation events that ensure transmission and contribute to clinical disease. Current antivirals do not impact the latent reservoir and there are no vaccines. While the molecular details of lytic replication are well-characterized, mechanisms controlling latency in neurons remain elusive. Our present understanding of latency is derived from in vivo studies using small animal models, which have been indispensable for defining viral gene requirements and the role of immune responses. However, it is impossible to distinguish specific effects on the virus-neuron relationship from more general consequences of infection mediated by immune or non-neuronal support cells in live animals. In addition, animal experimentation is costly, time-consuming, and limited in terms of available options for manipulating host processes. To overcome these limitations, a neuron-only system is desperately needed that reproduces the in vivo characteristics of latency and reactivation but offers the benefits of tissue culture in terms of homogeneity and accessibility. Here we present an in vitro model utilizing cultured primary sympathetic neurons from rat superior cervical ganglia (SCG) (Figure 1) to study HSV-1 latency and reactivation that fits most if not all of the desired criteria. After eliminating non-neuronal cells, near-homogeneous TrkA+ neuron cultures are infected with HSV-1 in the presence of acyclovir (ACV) to suppress lytic replication. Following ACV removal, non-productive HSV-1 infections that faithfully exhibit accepted hallmarks of latency are efficiently established. Notably, lytic mRNAs, proteins, and infectious virus become undetectable, even in the absence of selection, but latency-associated transcript (LAT) expression persists in neuronal nuclei. Viral genomes are maintained at an average copy number of 25 per neuron and can be induced to productively replicate by interfering with PI3-Kinase / Akt signaling or the simple withdrawal of nerve growth factor1. A recombinant HSV-1 encoding EGFP fused to the viral lytic protein Us11 provides a functional, real-time marker for replication resulting from reactivation that is readily quantified. In addition to chemical treatments, genetic methodologies such as RNA-interference or gene delivery via lentiviral vectors can be successfully applied to the system permitting mechanistic studies that are very difficult, if not impossible, in animals. In summary, the SCG-based HSV-1 latency / reactivation system provides a powerful, necessary tool to unravel the molecular mechanisms controlling HSV1 latency and reactivation in neurons, a long standing puzzle in virology whose solution may offer fresh insights into developing new therapies that target the latent herpesvirus reservoir.
Immunology, Issue 62, neuron cell culture, Herpes Simplex Virus (HSV), molecular biology, virology
3823
Play Button
Dissecting Host-virus Interaction in Lytic Replication of a Model Herpesvirus
Authors: Xiaonan Dong, Pinghui Feng.
Institutions: UT Southwestern Medical Center, UT Southwestern Medical Center.
In response to viral infection, a host develops various defensive responses, such as activating innate immune signaling pathways that lead to antiviral cytokine production1,2. In order to colonize the host, viruses are obligate to evade host antiviral responses and manipulate signaling pathways. Unraveling the host-virus interaction will shed light on the development of novel therapeutic strategies against viral infection. Murine γHV68 is closely related to human oncogenic Kaposi's sarcoma-associated herpesvirus and Epsten-Barr virus3,4. γHV68 infection in laboratory mice provides a tractable small animal model to examine the entire course of host responses and viral infection in vivo, which are not available for human herpesviruses. In this protocol, we present a panel of methods for phenotypic characterization and molecular dissection of host signaling components in γHV68 lytic replication both in vivo and ex vivo. The availability of genetically modified mouse strains permits the interrogation of the roles of host signaling pathways during γHV68 acute infection in vivo. Additionally, mouse embryonic fibroblasts (MEFs) isolated from these deficient mouse strains can be used to further dissect roles of these molecules during γHV68 lytic replication ex vivo. Using virological and molecular biology assays, we can pinpoint the molecular mechanism of host-virus interactions and identify host and viral genes essential for viral lytic replication. Finally, a bacterial artificial chromosome (BAC) system facilitates the introduction of mutations into the viral factor(s) that specifically interrupt the host-virus interaction. Recombinant γHV68 carrying these mutations can be used to recapitulate the phenotypes of γHV68 lytic replication in MEFs deficient in key host signaling components. This protocol offers an excellent strategy to interrogate host-pathogen interaction at multiple levels of intervention in vivo and ex vivo. Recently, we have discovered that γHV68 usurps an innate immune signaling pathway to promote viral lytic replication5. Specifically, γHV68 de novo infection activates the immune kinase IKKβ and activated IKKβ phosphorylates the master viral transcription factor, replication and transactivator (RTA), to promote viral transcriptional activation. In doing so, γHV68 efficiently couples its transcriptional activation to host innate immune activation, thereby facilitating viral transcription and lytic replication. This study provides an excellent example that can be applied to other viruses to interrogate host-virus interaction.
Immunology, Issue 56, herpesvirus, gamma herpesvirus 68, γHV68, signaling pathways, host-virus interaction, viral lytic replication
3140
Play Button
Identifying Dysregulated Genes Induced by Kaposi's Sarcoma-associated Herpesvirus (KSHV)
Authors: Donald Alcendor, Susan Knobel.
Institutions: Meharry Medical College.
Currently KS is the most predominant HIV/AIDS related malignancy in Southern Africa and hence the world.1,2 It is characterized as an angioproliferative tumor of vascular endothelial cells and produces rare B cell lymphoproliferative diseases in the form of pleural effusion lymphomas (PEL) and some forms of multicentric Castleman's disease.3-5 Only 1-5% of cells in KS lesions actively support lytic replication of Kaposi's sarcoma-associated herpesvirus (KSHV), the etiological agent associated with KS, and it is clear that cellular factors must interact with viral factors in the process of oncogenesis and tumor progression.6,7 Identifying novel host-factor determinants which contribute to KS pathology is essential for developing prognostic markers for tumor progression and metastasis as well as for developing novel therapeutics for the treatment of KS.8 The accompanying video details the methods we use to identify host cell gene expression programs altered in dermal microvascular endothelial cells (DMVEC) after KSHV infection and in KS tumor tissue.9 Once dysregulated genes are identified by microarray analysis, changes in protein expression are confirmed by immunoblot and dual labeled immunofluorescence. Changes in transcriptional expression of dysregulated genes are confirmed in vitro by quantitative real-time polymerase chain reaction (qRT-PCR). Validation of in vitro findings using archival KS tumor tissue is also performed by dual labeled immunochemistry and tissue microarrays.8,10 Our approach to identifying dysregulated genes in the KS tumor tissue microenvironment will allow the development of in vitro and subsequently in vivo model systems for discovery and evaluation of potential novel therapeutic for the treatment of KS.
Immunology, Issue 43, virology, Kaposi's sarcoma, microarrays, infection, microscopy
2078
Play Button
Establishment of Epstein-Barr Virus Growth-transformed Lymphoblastoid Cell Lines
Authors: Joyce Hui-Yuen, Shane McAllister, Siva Koganti, Erik Hill, Sumita Bhaduri-McIntosh.
Institutions: State University of New York at Stony Brook, State University of New York at Stony Brook, State University of New York at Stony Brook, State University of New York at Stony Brook.
Infection of B cells with Epstein-Barr virus (EBV) leads to proliferation and subsequent immortalization, resulting in establishment of lymphoblastoid cell lines (LCL) in vitro. Since LCL are latently infected with EBV, they provide a model system to investigate EBV latency and virus-driven B cell proliferation and tumorigenesis1. LCL have been used to present antigens in a variety of immunologic assays2, 3. In addition, LCL can be used to generate human monoclonal antibodies4, 5 and provide a potentially unlimited source when access to primary biologic materials is limited6, 7. A variety of methods have been described to generate LCL. Earlier methods have included the use of mitogens such as phytohemagglutinin, lipopolysaccharide8, and pokeweed mitogen9 to increase the efficiency of EBV-mediated immortalization. More recently, others have used immunosuppressive agents such as cyclosporin A to inhibit T cell-mediated killing of infected B cells7, 10-12. The considerable length of time from EBV infection to establishment of cell lines drives the requirement for quicker and more reliable methods for EBV-driven B cell growth transformation. Using a combination of high titer EBV and an immunosuppressive agent, we are able to consistently infect, transform, and generate LCL from B cells in peripheral blood. This method uses a small amount of peripheral blood mononuclear cells that are infected in vitroclusters of cells can be demonstrated. The presence of CD23 with EBV in the presence of FK506, a T cell immunosuppressant. Traditionally, outgrowth of proliferating B cells is monitored by visualization of microscopic clusters of cells about a week after infection with EBV. Clumps of LCL can be seen by the naked eye after several weeks. We describe an assay to determine early if EBV-mediated growth transformation is successful even before microscopic clusters of cells can be demonstrated. The presence of CD23hiCD58+ cells observed as early as three days post-infection indicates a successful outcome.
Immunology, Issue 57, Epstein-Barr virus, EBV, lymphoblastoid cell lines, LCL, transformation, immortalization, PBMC
3321
Play Button
Expanding Cytotoxic T Lymphocytes from Umbilical Cord Blood that Target Cytomegalovirus, Epstein-Barr Virus, and Adenovirus
Authors: Patrick J. Hanley, Sharon Lam, Elizabeth J. Shpall, Catherine M. Bollard.
Institutions: Baylor College of Medicine , Baylor College of Medicine , University of Texas M.D. Anderson Cancer Center, Baylor College of Medicine , Baylor College of Medicine .
Virus infections after stem cell transplantation are among the most common causes of death, especially after cord blood (CB) transplantation (CBT) where the CB does not contain appreciable numbers of virus-experienced T cells which can protect the recipient from infection.1-4 We and others have shown that virus-specific CTL generated from seropositive donors and infused to the recipient are safe and protective.5-8 However, until recently, virus-specific T cells could not be generated from cord blood, likely due to the absence of virus-specific memory T cells. In an effort to better mimic the in vivo priming conditions of naïve T cells, we established a method that used CB-derived dendritic cells (DC) transduced with an adenoviral vector (Ad5f35pp65) containing the immunodominant CMV antigen pp65, hence driving T cell specificity towards CMV and adenovirus.9 At initiation, we use these matured DCs as well as CB-derived T cells in the presence of the cytokines IL-7, IL-12, and IL-15.10 At the second stimulation we used EBV-transformed B cells, or EBV-LCL, which express both latent and lytic EBV antigens. Ad5f35pp65-transduced EBV-LCL are used to stimulate the T cells in the presence of IL-15 at the second stimulation. Subsequent stimulations use Ad5f35pp65-transduced EBV-LCL and IL-2. From 50x106 CB mononuclear cells we are able to generate upwards of 150 x 106 virus-specific T cells that lyse antigen-pulsed targets and release cytokines in response to antigenic stimulation.11 These cells were manufactured in a GMP-compliant manner using only the 20% fraction of a fractionated cord blood unit and have been translated for clinical use.
Immunology, Issue 63, Cytotoxic T Lymphocytes (CTL), virus, stem cell transplantation, cord blood, naïve T cells, medicine
3627
Play Button
Extinction Training During the Reconsolidation Window Prevents Recovery of Fear
Authors: Daniela Schiller, Candace M. Raio, Elizabeth A. Phelps.
Institutions: Mt. Sinai School of Medicine, New York University , New York University .
Fear is maladaptive when it persists long after circumstances have become safe. It is therefore crucial to develop an approach that persistently prevents the return of fear. Pavlovian fear-conditioning paradigms are commonly employed to create a controlled, novel fear association in the laboratory. After pairing an innocuous stimulus (conditioned stimulus, CS) with an aversive outcome (unconditioned stimulus, US) we can elicit a fear response (conditioned response, or CR) by presenting just the stimulus alone1,2 . Once fear is acquired, it can be diminished using extinction training, whereby the conditioned stimulus is repeatedly presented without the aversive outcome until fear is no longer expressed3. This inhibitory learning creates a new, safe representation for the CS, which competes for expression with the original fear memory4. Although extinction is effective at inhibiting fear, it is not permanent. Fear can spontaneously recover with the passage of time. Exposure to stress or returning to the context of initial learning can also cause fear to resurface3,4. Our protocol addresses the transient nature of extinction by targeting the reconsolidation window to modify emotional memory in a more permanent manner. Ample evidence suggests that reactivating a consolidated memory returns it to a labile state, during which the memory is again susceptible to interference5-9. This window of opportunity appears to open shortly after reactivation and close approximately 6hrs later5,11,16, although this may vary depending on the strength and age of the memory15. By allowing new information to incorporate into the original memory trace, this memory may be updated as it reconsolidates10,11. Studies involving non-human animals have successfully blocked the expression of fear memory by introducing pharmacological manipulations within the reconsolidation window, however, most agents used are either toxic to humans or show equivocal effects when used in human studies12-14. Our protocol addresses these challenges by offering an effective, yet non-invasive, behavioral manipulation that is safe for humans. By prompting fear memory retrieval prior to extinction, we essentially trigger the reconsolidation process, allowing new safety information (i.e., extinction) to be incorporated while the fear memory is still susceptible to interference. A recent study employing this behavioral manipulation in rats has successfully blocked fear memory using these temporal parameters11. Additional studies in humans have demonstrated that introducing new information after the retrieval of previously consolidated motor16, episodic17, or declarative18 memories leads to interference with the original memory trace14. We outline below a novel protocol used to block fear recovery in humans.
Neuroscience, Issue 66, Medicine, Psychology, Physiology, Fear conditioning, extinction, reconsolidation, emotional memory, spontaneous recovery, skin conductance response
3893
Play Button
Automated, Quantitative Cognitive/Behavioral Screening of Mice: For Genetics, Pharmacology, Animal Cognition and Undergraduate Instruction
Authors: C. R. Gallistel, Fuat Balci, David Freestone, Aaron Kheifets, Adam King.
Institutions: Rutgers University, Koç University, New York University, Fairfield University.
We describe a high-throughput, high-volume, fully automated, live-in 24/7 behavioral testing system for assessing the effects of genetic and pharmacological manipulations on basic mechanisms of cognition and learning in mice. A standard polypropylene mouse housing tub is connected through an acrylic tube to a standard commercial mouse test box. The test box has 3 hoppers, 2 of which are connected to pellet feeders. All are internally illuminable with an LED and monitored for head entries by infrared (IR) beams. Mice live in the environment, which eliminates handling during screening. They obtain their food during two or more daily feeding periods by performing in operant (instrumental) and Pavlovian (classical) protocols, for which we have written protocol-control software and quasi-real-time data analysis and graphing software. The data analysis and graphing routines are written in a MATLAB-based language created to simplify greatly the analysis of large time-stamped behavioral and physiological event records and to preserve a full data trail from raw data through all intermediate analyses to the published graphs and statistics within a single data structure. The data-analysis code harvests the data several times a day and subjects it to statistical and graphical analyses, which are automatically stored in the "cloud" and on in-lab computers. Thus, the progress of individual mice is visualized and quantified daily. The data-analysis code talks to the protocol-control code, permitting the automated advance from protocol to protocol of individual subjects. The behavioral protocols implemented are matching, autoshaping, timed hopper-switching, risk assessment in timed hopper-switching, impulsivity measurement, and the circadian anticipation of food availability. Open-source protocol-control and data-analysis code makes the addition of new protocols simple. Eight test environments fit in a 48 in x 24 in x 78 in cabinet; two such cabinets (16 environments) may be controlled by one computer.
Behavior, Issue 84, genetics, cognitive mechanisms, behavioral screening, learning, memory, timing
51047
Play Button
Development of an IFN-γ ELISpot Assay to Assess Varicella-Zoster Virus-specific Cell-mediated Immunity Following Umbilical Cord Blood Transplantation
Authors: Insaf Salem Fourati, Anne-Julie Grenier, Élyse Jolette, Natacha Merindol, Philippe Ovetchkine, Hugo Soudeyns.
Institutions: Université de Montréal, Université de Montréal, Université de Montréal.
Varicella zoster virus (VZV) is a significant cause of morbidity and mortality following umbilical cord blood transplantation (UCBT). For this reason, antiherpetic prophylaxis is administrated systematically to pediatric UCBT recipients to prevent complications associated with VZV infection, but there is no strong, evidence based consensus that defines its optimal duration. Because T cell mediated immunity is responsible for the control of VZV infection, assessing the reconstitution of VZV specific T cell responses following UCBT could provide indications as to whether prophylaxis should be maintained or can be discontinued. To this end, a VZV specific gamma interferon (IFN-γ) enzyme-linked immunospot (ELISpot) assay was developed to characterize IFN-γ production by T lymphocytes in response to in vitro stimulation with irradiated live attenuated VZV vaccine. This assay provides a rapid, reproducible and sensitive measurement of VZV specific cell mediated immunity suitable for monitoring the reconstitution of VZV specific immunity in a clinical setting and assessing immune responsiveness to VZV antigens.  
Immunology, Issue 89, Varicella zoster virus, cell-mediated immunity, T cells, interferon gamma, ELISpot, umbilical cord blood transplantation
51643
Play Button
Generation of Multivirus-specific T Cells to Prevent/treat Viral Infections after Allogeneic Hematopoietic Stem Cell Transplant
Authors: Ulrike Gerdemann, Juan F. Vera, Cliona M. Rooney, Ann M. Leen.
Institutions: Baylor College of Medicine.
Viral infections cause morbidity and mortality in allogeneic hematopoietic stem cell transplant (HSCT) recipients. We and others have successfully generated and infused T-cells specific for Epstein Barr virus (EBV), cytomegalovirus (CMV) and Adenovirus (Adv) using monocytes and EBV-transformed lymphoblastoid cell (EBV-LCL) gene-modified with an adenovirus vector as antigen presenting cells (APCs). As few as 2x105/kg trivirus-specific cytotoxic T lymphocytes (CTL) proliferated by several logs after infusion and appeared to prevent and treat even severe viral disease resistant to other available therapies. The broader implementation of this encouraging approach is limited by high production costs, complexity of manufacture and the prolonged time (4-6 weeks for EBV-LCL generation, and 4-8 weeks for CTL manufacture – total 10-14 weeks) for preparation. To overcome these limitations we have developed a new, GMP-compliant CTL production protocol. First, in place of adenovectors to stimulate T-cells we use dendritic cells (DCs) nucleofected with DNA plasmids encoding LMP2, EBNA1 and BZLF1 (EBV), Hexon and Penton (Adv), and pp65 and IE1 (CMV) as antigen-presenting cells. These APCs reactivate T cells specific for all the stimulating antigens. Second, culture of activated T-cells in the presence of IL-4 (1,000U/ml) and IL-7 (10ng/ml) increases and sustains the repertoire and frequency of specific T cells in our lines. Third, we have used a new, gas permeable culture device (G-Rex) that promotes the expansion and survival of large cell numbers after a single stimulation, thus removing the requirement for EBV-LCLs and reducing technician intervention. By implementing these changes we can now produce multispecific CTL targeting EBV, CMV, and Adv at a cost per 106 cells that is reduced by >90%, and in just 10 days rather than 10 weeks using an approach that may be extended to additional protective viral antigens. Our FDA-approved approach should be of value for prophylactic and treatment applications for high risk allogeneic HSCT recipients.
Immunology, Issue 51, T cells, immunotherapy, viral infections, nucleofection, plasmids, G-Rex culture device
2736
Play Button
Metabolic Labeling of Newly Transcribed RNA for High Resolution Gene Expression Profiling of RNA Synthesis, Processing and Decay in Cell Culture
Authors: Bernd Rädle, Andrzej J. Rutkowski, Zsolt Ruzsics, Caroline C. Friedel, Ulrich H. Koszinowski, Lars Dölken.
Institutions: Max von Pettenkofer Institute, University of Cambridge, Ludwig-Maximilians-University Munich.
The development of whole-transcriptome microarrays and next-generation sequencing has revolutionized our understanding of the complexity of cellular gene expression. Along with a better understanding of the involved molecular mechanisms, precise measurements of the underlying kinetics have become increasingly important. Here, these powerful methodologies face major limitations due to intrinsic properties of the template samples they study, i.e. total cellular RNA. In many cases changes in total cellular RNA occur either too slowly or too quickly to represent the underlying molecular events and their kinetics with sufficient resolution. In addition, the contribution of alterations in RNA synthesis, processing, and decay are not readily differentiated. We recently developed high-resolution gene expression profiling to overcome these limitations. Our approach is based on metabolic labeling of newly transcribed RNA with 4-thiouridine (thus also referred to as 4sU-tagging) followed by rigorous purification of newly transcribed RNA using thiol-specific biotinylation and streptavidin-coated magnetic beads. It is applicable to a broad range of organisms including vertebrates, Drosophila, and yeast. We successfully applied 4sU-tagging to study real-time kinetics of transcription factor activities, provide precise measurements of RNA half-lives, and obtain novel insights into the kinetics of RNA processing. Finally, computational modeling can be employed to generate an integrated, comprehensive analysis of the underlying molecular mechanisms.
Genetics, Issue 78, Cellular Biology, Molecular Biology, Microbiology, Biochemistry, Eukaryota, Investigative Techniques, Biological Phenomena, Gene expression profiling, RNA synthesis, RNA processing, RNA decay, 4-thiouridine, 4sU-tagging, microarray analysis, RNA-seq, RNA, DNA, PCR, sequencing
50195
Play Button
Aseptic Laboratory Techniques: Plating Methods
Authors: Erin R. Sanders.
Institutions: University of California, Los Angeles .
Microorganisms are present on all inanimate surfaces creating ubiquitous sources of possible contamination in the laboratory. Experimental success relies on the ability of a scientist to sterilize work surfaces and equipment as well as prevent contact of sterile instruments and solutions with non-sterile surfaces. Here we present the steps for several plating methods routinely used in the laboratory to isolate, propagate, or enumerate microorganisms such as bacteria and phage. All five methods incorporate aseptic technique, or procedures that maintain the sterility of experimental materials. Procedures described include (1) streak-plating bacterial cultures to isolate single colonies, (2) pour-plating and (3) spread-plating to enumerate viable bacterial colonies, (4) soft agar overlays to isolate phage and enumerate plaques, and (5) replica-plating to transfer cells from one plate to another in an identical spatial pattern. These procedures can be performed at the laboratory bench, provided they involve non-pathogenic strains of microorganisms (Biosafety Level 1, BSL-1). If working with BSL-2 organisms, then these manipulations must take place in a biosafety cabinet. Consult the most current edition of the Biosafety in Microbiological and Biomedical Laboratories (BMBL) as well as Material Safety Data Sheets (MSDS) for Infectious Substances to determine the biohazard classification as well as the safety precautions and containment facilities required for the microorganism in question. Bacterial strains and phage stocks can be obtained from research investigators, companies, and collections maintained by particular organizations such as the American Type Culture Collection (ATCC). It is recommended that non-pathogenic strains be used when learning the various plating methods. By following the procedures described in this protocol, students should be able to: ● Perform plating procedures without contaminating media. ● Isolate single bacterial colonies by the streak-plating method. ● Use pour-plating and spread-plating methods to determine the concentration of bacteria. ● Perform soft agar overlays when working with phage. ● Transfer bacterial cells from one plate to another using the replica-plating procedure. ● Given an experimental task, select the appropriate plating method.
Basic Protocols, Issue 63, Streak plates, pour plates, soft agar overlays, spread plates, replica plates, bacteria, colonies, phage, plaques, dilutions
3064
Play Button
A Restriction Enzyme Based Cloning Method to Assess the In vitro Replication Capacity of HIV-1 Subtype C Gag-MJ4 Chimeric Viruses
Authors: Daniel T. Claiborne, Jessica L. Prince, Eric Hunter.
Institutions: Emory University, Emory University.
The protective effect of many HLA class I alleles on HIV-1 pathogenesis and disease progression is, in part, attributed to their ability to target conserved portions of the HIV-1 genome that escape with difficulty. Sequence changes attributed to cellular immune pressure arise across the genome during infection, and if found within conserved regions of the genome such as Gag, can affect the ability of the virus to replicate in vitro. Transmission of HLA-linked polymorphisms in Gag to HLA-mismatched recipients has been associated with reduced set point viral loads. We hypothesized this may be due to a reduced replication capacity of the virus. Here we present a novel method for assessing the in vitro replication of HIV-1 as influenced by the gag gene isolated from acute time points from subtype C infected Zambians. This method uses restriction enzyme based cloning to insert the gag gene into a common subtype C HIV-1 proviral backbone, MJ4. This makes it more appropriate to the study of subtype C sequences than previous recombination based methods that have assessed the in vitro replication of chronically derived gag-pro sequences. Nevertheless, the protocol could be readily modified for studies of viruses from other subtypes. Moreover, this protocol details a robust and reproducible method for assessing the replication capacity of the Gag-MJ4 chimeric viruses on a CEM-based T cell line. This method was utilized for the study of Gag-MJ4 chimeric viruses derived from 149 subtype C acutely infected Zambians, and has allowed for the identification of residues in Gag that affect replication. More importantly, the implementation of this technique has facilitated a deeper understanding of how viral replication defines parameters of early HIV-1 pathogenesis such as set point viral load and longitudinal CD4+ T cell decline.
Infectious Diseases, Issue 90, HIV-1, Gag, viral replication, replication capacity, viral fitness, MJ4, CEM, GXR25
51506
Play Button
Recurrent Herpetic Stromal Keratitis in Mice, a Model for Studying Human HSK
Authors: Jessica Morris, Patrick M. Stuart, Megan Rogge, Chloe Potter, Nipun Gupta, Xiao-Tang Yin.
Institutions: Saint Louis University.
Herpetic eye disease, termed herpetic stromal keratitis (HSK), is a potentially blinding infection of the cornea that results in over 300,000 clinical visits each year for treatment. Between 1 and 2 percent of those patients with clinical disease will experience loss of vision of the infected cornea. The vast majority of these cases are the result of reactivation of a latent infection by herpes simplex type I virus and not due to acute disease. Interestingly, the acute infection is the model most often used to study this disease. However, it was felt that a recurrent model of HSK would be more reflective of what occurs during clinical disease. The recurrent animal models for HSK have employed both rabbits and mice. The advantage of rabbits is that they experience reactivation from latency absent any known stimulus. That said, it is difficult to explore the role that many immunological factors play in recurrent HSK because the rabbit model does not have the immunological and genetic resources that the mouse has. We chose to use the mouse model for recurrent HSK because it has the advantage of there being many resources available and also we know when reactivation will occur because reactivation is induced by exposure to UV-B light. Thus far, this model has allowed those laboratories using it to define several immunological factors that are important to this disease. It has also allowed us to test both therapeutic and vaccine efficacy.
Infection, Issue 70, Immunology, Virology, Medicine, Infectious Diseases, Ophthalmology, Herpes, herpetic stromal keratitis, HSK, keratitis, pathogenesis, clinical evaluation, virus, eye, mouse, animal model
4276
Play Button
Detection of the Genome and Transcripts of a Persistent DNA Virus in Neuronal Tissues by Fluorescent In situ Hybridization Combined with Immunostaining
Authors: Frédéric Catez, Antoine Rousseau, Marc Labetoulle, Patrick Lomonte.
Institutions: CNRS UMR 5534, Université de Lyon 1, LabEX DEVweCAN, CNRS UPR 3296, CNRS UMR 5286.
Single cell codetection of a gene, its RNA product and cellular regulatory proteins is critical to study gene expression regulation. This is a challenge in the field of virology; in particular for nuclear-replicating persistent DNA viruses that involve animal models for their study. Herpes simplex virus type 1 (HSV-1) establishes a life-long latent infection in peripheral neurons. Latent virus serves as reservoir, from which it reactivates and induces a new herpetic episode. The cell biology of HSV-1 latency remains poorly understood, in part due to the lack of methods to detect HSV-1 genomes in situ in animal models. We describe a DNA-fluorescent in situ hybridization (FISH) approach efficiently detecting low-copy viral genomes within sections of neuronal tissues from infected animal models. The method relies on heat-based antigen unmasking, and directly labeled home-made DNA probes, or commercially available probes. We developed a triple staining approach, combining DNA-FISH with RNA-FISH and immunofluorescence, using peroxidase based signal amplification to accommodate each staining requirement. A major improvement is the ability to obtain, within 10 µm tissue sections, low-background signals that can be imaged at high resolution by confocal microscopy and wide-field conventional epifluorescence. Additionally, the triple staining worked with a wide range of antibodies directed against cellular and viral proteins. The complete protocol takes 2.5 days to accommodate antibody and probe penetration within the tissue.
Neuroscience, Issue 83, Life Sciences (General), Virology, Herpes Simplex Virus (HSV), Latency, In situ hybridization, Nuclear organization, Gene expression, Microscopy
51091
Play Button
Dissecting Innate Immune Signaling in Viral Evasion of Cytokine Production
Authors: Junjie Zhang, Lining Zhu, Pinghui Feng.
Institutions: Keck School of Medicine, University of Southern California.
In response to a viral infection, the host innate immune response is activated to up-regulate gene expression and production of antiviral cytokines. Conversely, viruses have evolved intricate strategies to evade and exploit host immune signaling for survival and propagation. Viral immune evasion, entailing host defense and viral evasion, provides one of the most fascinating and dynamic interfaces to discern the host-virus interaction. These studies advance our understanding in innate immune regulation and pave our way to develop novel antiviral therapies. Murine γHV68 is a natural pathogen of murine rodents. γHV68 infection of mice provides a tractable small animal model to examine the antiviral response to human KSHV and EBV of which perturbation of in vivo virus-host interactions is not applicable. Here we describe a protocol to determine the antiviral cytokine production. This protocol can be adapted to other viruses and signaling pathways. Recently, we have discovered that γHV68 hijacks MAVS and IKKβ, key innate immune signaling components downstream of the cytosolic RIG-I and MDA5, to abrogate NFΚB activation and antiviral cytokine production. Specifically, γHV68 infection activates IKKβ and that activated IKKβ phosphorylates RelA to accelerate RelA degradation. As such, γHV68 efficiently uncouples NFΚB activation from its upstream activated IKKβ, negating antiviral cytokine gene expression. This study elucidates an intricate strategy whereby the upstream innate immune activation is intercepted by a viral pathogen to nullify the immediate downstream transcriptional activation and evade antiviral cytokine production.
Immunology, Issue 85, Herpesviridae, Cytokines, Antiviral Agents, Innate, gamma-HV68, mice infection, MEF, antiviral cytokine
51078
Play Button
Monitoring Plasmid Replication in Live Mammalian Cells over Multiple Generations by Fluorescence Microscopy
Authors: Kathryn Norby, Ya-Fang Chiu, Bill Sugden.
Institutions: University of Wisconsin - Madison.
Few naturally-occurring plasmids are maintained in mammalian cells. Among these are genomes of gamma-herpesviruses, including Epstein-Barr virus (EBV) and Kaposi's Sarcoma-associated herpesvirus (KSHV), which cause multiple human malignancies 1-3. These two genomes are replicated in a licensed manner, each using a single viral protein and cellular replication machinery, and are passed to daughter cells during cell division despite their lacking traditional centromeres 4-8. Much work has been done to characterize the replications of these plasmid genomes using methods such as Southern blotting and fluorescence in situ hybridization (FISH). These methods are limited, though. Quantitative PCR and Southern blots provide information about the average number of plasmids per cell in a population of cells. FISH is a single-cell assay that reveals both the average number and the distribution of plasmids per cell in the population of cells but is static, allowing no information about the parent or progeny of the examined cell. Here, we describe a method for visualizing plasmids in live cells. This method is based on the binding of a fluorescently tagged lactose repressor protein to multiple sites in the plasmid of interest 9. The DNA of interest is engineered to include approximately 250 tandem repeats of the lactose operator (LacO) sequence. LacO is specifically bound by the lactose repressor protein (LacI), which can be fused to a fluorescent protein. The fusion protein can either be expressed from the engineered plasmid or introduced by a retroviral vector. In this way, the DNA molecules are fluorescently tagged and therefore become visible via fluorescence microscopy. The fusion protein is blocked from binding the plasmid DNA by culturing cells in the presence of IPTG until the plasmids are ready to be viewed. This system allows the plasmids to be monitored in living cells through several generations, revealing properties of their synthesis and partitioning to daughter cells. Ideal cells are adherent, easily transfected, and have large nuclei. This technique has been used to determine that 84% of EBV-derived plasmids are synthesized each generation and 88% of the newly synthesized plasmids partition faithfully to daughter cells in HeLa cells. Pairs of these EBV plasmids were seen to be tethered to or associated with sister chromatids after their synthesis in S-phase until they were seen to separate as the sister chromatids separated in Anaphase10. The method is currently being used to study replication of KSHV genomes in HeLa cells and SLK cells. HeLa cells are immortalized human epithelial cells, and SLK cells are immortalized human endothelial cells. Though SLK cells were originally derived from a KSHV lesion, neither the HeLa nor SLK cell line naturally harbors KSHV genomes11. In addition to studying viral replication, this visualization technique can be used to investigate the effects of the addition, removal, or mutation of various DNA sequence elements on synthesis, localization, and partitioning of other recombinant plasmid DNAs.
Genetics, Issue 70, Molecular Biology, Cellular Biology, Genomics, DNA synthesis, DNA partitioning, plasmids, lac operator, lac repressor, mammalian cells, fluorescence microscopy
4305
Play Button
Measuring Attentional Biases for Threat in Children and Adults
Authors: Vanessa LoBue.
Institutions: Rutgers University.
Investigators have long been interested in the human propensity for the rapid detection of threatening stimuli. However, until recently, research in this domain has focused almost exclusively on adult participants, completely ignoring the topic of threat detection over the course of development. One of the biggest reasons for the lack of developmental work in this area is likely the absence of a reliable paradigm that can measure perceptual biases for threat in children. To address this issue, we recently designed a modified visual search paradigm similar to the standard adult paradigm that is appropriate for studying threat detection in preschool-aged participants. Here we describe this new procedure. In the general paradigm, we present participants with matrices of color photographs, and ask them to find and touch a target on the screen. Latency to touch the target is recorded. Using a touch-screen monitor makes the procedure simple and easy, allowing us to collect data in participants ranging from 3 years of age to adults. Thus far, the paradigm has consistently shown that both adults and children detect threatening stimuli (e.g., snakes, spiders, angry/fearful faces) more quickly than neutral stimuli (e.g., flowers, mushrooms, happy/neutral faces). Altogether, this procedure provides an important new tool for researchers interested in studying the development of attentional biases for threat.
Behavior, Issue 92, Detection, threat, attention, attentional bias, anxiety, visual search
52190
Copyright © JoVE 2006-2015. All Rights Reserved.
Policies | License Agreement | ISSN 1940-087X
simple hit counter

What is Visualize?

JoVE Visualize is a tool created to match the last 5 years of PubMed publications to methods in JoVE's video library.

How does it work?

We use abstracts found on PubMed and match them to JoVE videos to create a list of 10 to 30 related methods videos.

Video X seems to be unrelated to Abstract Y...

In developing our video relationships, we compare around 5 million PubMed articles to our library of over 4,500 methods videos. In some cases the language used in the PubMed abstracts makes matching that content to a JoVE video difficult. In other cases, there happens not to be any content in our video library that is relevant to the topic of a given abstract. In these cases, our algorithms are trying their best to display videos with relevant content, which can sometimes result in matched videos with only a slight relation.