SlideShare a Scribd company logo
SOUTHERN BLOT
CAROLYN EYRE
WHAT IS SOUTHERN BLOTTING?

 A process used for DNA analysis


 Developed by Edwin Southern in 1975


 Is also referred to as DNA blotting




                                        Edwin Southern
USE IN GENETICALLY MODIFIED
              ORGANISMS

 In genetically modified organisms, Southern blots are used to

  make certain that the necessary section of DNA has been

  inserted into the genome of the organism being modified.
STEP 1

 DNA is separated from it’s source and cut with a restriction

  enzyme.
STEP 2

 The fragments are put into a gel and are sorted by electrophoresis

  in order of length, the shortest at the top and the longest at the

  bottom.
STEP 3

 Ethidium bromide is then used to make the fragments visible, and

  the DNA is taken from the gel and placed in a nylon filter.
STEP 4

 Then a radioactive probe is added, which binds to complementary

  DNA fragments.
STEP 5

 The nylon membrane is then covered with an X- ray film which,

  when developed, reveals the position of the radioactive probe.

More Related Content

What's hot

Blotting techniques
Blotting techniquesBlotting techniques
Blotting techniques
Kashikant Yadav
 
Northern blotting
Northern blottingNorthern blotting
Northern blotting
Sachin Patil
 
Real time pcr
Real time pcrReal time pcr
Real time pcr
MUSKANKr
 
Southern and northern blotting technique
Southern and northern blotting techniqueSouthern and northern blotting technique
Southern blotting
Southern blottingSouthern blotting
Southern blotting
MerinAliceGeorge
 
Blotting techniques1
Blotting techniques1Blotting techniques1
Blotting techniques1
Tapeshwar Yadav
 
Restriction enzyme
Restriction enzymeRestriction enzyme
Restriction enzyme
Ananya Azad Hrisha
 
Southern Blotting
Southern BlottingSouthern Blotting
Southern Blotting
Anik Banik
 
Basics of DNA isolation
Basics of DNA isolation Basics of DNA isolation
Basics of DNA isolation
Md. Abu Bakar Siddik
 
Blotting techniques
Blotting techniquesBlotting techniques
Blotting techniques
Kashikant Yadav
 
Dna Footprinting
Dna FootprintingDna Footprinting
Dna Footprinting
Adarsh P P
 
Next generation sequencing
Next generation sequencingNext generation sequencing
Next generation sequencing
neelmanayab
 
DNA microarray ppt
DNA microarray pptDNA microarray ppt
DNA microarray ppt
Mohit Kohli
 
Western blotting
Western blotting Western blotting
Western blotting
BhupendraRegmi
 
Sds page electrophoresis
Sds page electrophoresisSds page electrophoresis
Sds page electrophoresis
Kumari Jyoti
 
Southern blotting
Southern blottingSouthern blotting
Southern blotting
Akansha Soni
 
eukaryotic genome
eukaryotic genomeeukaryotic genome
eukaryotic genome
HiraNaveed12
 
Dna sequencing
Dna sequencingDna sequencing
Dna sequencing
dibya ranjan
 

What's hot (20)

Blotting techniques
Blotting techniquesBlotting techniques
Blotting techniques
 
Northern blotting
Northern blottingNorthern blotting
Northern blotting
 
Real time pcr
Real time pcrReal time pcr
Real time pcr
 
Southern and northern blotting technique
Southern and northern blotting techniqueSouthern and northern blotting technique
Southern and northern blotting technique
 
Southern blotting
Southern blottingSouthern blotting
Southern blotting
 
Blotting techniques1
Blotting techniques1Blotting techniques1
Blotting techniques1
 
Southern blotting
Southern blottingSouthern blotting
Southern blotting
 
Restriction enzyme
Restriction enzymeRestriction enzyme
Restriction enzyme
 
Southern Blotting
Southern BlottingSouthern Blotting
Southern Blotting
 
Basics of DNA isolation
Basics of DNA isolation Basics of DNA isolation
Basics of DNA isolation
 
Dna Sequencing
Dna SequencingDna Sequencing
Dna Sequencing
 
Blotting techniques
Blotting techniquesBlotting techniques
Blotting techniques
 
Dna Footprinting
Dna FootprintingDna Footprinting
Dna Footprinting
 
Next generation sequencing
Next generation sequencingNext generation sequencing
Next generation sequencing
 
DNA microarray ppt
DNA microarray pptDNA microarray ppt
DNA microarray ppt
 
Western blotting
Western blotting Western blotting
Western blotting
 
Sds page electrophoresis
Sds page electrophoresisSds page electrophoresis
Sds page electrophoresis
 
Southern blotting
Southern blottingSouthern blotting
Southern blotting
 
eukaryotic genome
eukaryotic genomeeukaryotic genome
eukaryotic genome
 
Dna sequencing
Dna sequencingDna sequencing
Dna sequencing
 

Similar to Southern blot power point

Southern blotting
Southern blottingSouthern blotting
Southern blotting
Batool Abbas
 
VBC-321_BLOTTING_TECHNIQUES and gel electrophoresis
VBC-321_BLOTTING_TECHNIQUES and gel electrophoresisVBC-321_BLOTTING_TECHNIQUES and gel electrophoresis
VBC-321_BLOTTING_TECHNIQUES and gel electrophoresis
YoGeshSharma834784
 
Lecture 3 southern blotting
Lecture 3 southern blotting Lecture 3 southern blotting
Lecture 3 southern blotting
Dr Vishnu Kumar
 
Southern-blotting-and-Western-blotting.pptx
Southern-blotting-and-Western-blotting.pptxSouthern-blotting-and-Western-blotting.pptx
Southern-blotting-and-Western-blotting.pptx
KhushiDuttVatsa
 
southern blotting.pptx
southern blotting.pptxsouthern blotting.pptx
southern blotting.pptx
Nusrat Sheikh
 
blooting image.pptx
blooting image.pptxblooting image.pptx
blooting image.pptx
Hassan Yousaf
 
Southern blotting
Southern blottingSouthern blotting
Southern blotting
Rafa Zubair
 
Southern blotting
Southern blottingSouthern blotting
Southern blotting
HariniV39
 
Blotting Techniques
Blotting TechniquesBlotting Techniques
Blotting Techniques
Kurgat Gilbert
 
Blotting techniques1
Blotting techniques1Blotting techniques1
Blotting techniques1
Ashwini Somayaji
 
VBC-321_BLOTTING_TECHNIQUES.pptx
VBC-321_BLOTTING_TECHNIQUES.pptxVBC-321_BLOTTING_TECHNIQUES.pptx
VBC-321_BLOTTING_TECHNIQUES.pptx
SajadBhat46
 
Blotting techniques
Blotting techniquesBlotting techniques
Blotting techniques
Dipesh Tamrakar
 
Human genome project
Human genome projectHuman genome project
Human genome project15cookho
 
Souther and northern blotting systems
Souther and northern blotting systemsSouther and northern blotting systems
Souther and northern blotting systems
Ankit R. Chaudhary
 
Blotting techniques
Blotting techniquesBlotting techniques
Blotting techniques
OmBagade1
 
Blotting techniques.pptx
Blotting techniques.pptxBlotting techniques.pptx
Blotting techniques.pptx
FaizaRashid4
 
Southern blotting-1.pptx
Southern  blotting-1.pptxSouthern  blotting-1.pptx
Southern blotting-1.pptx
HurAbbasBajwa
 
Southern blotting
Southern blottingSouthern blotting
Southern blotting
Health Tech Facts
 
Application of biotechnology in forensic
Application of biotechnology in forensicApplication of biotechnology in forensic
Application of biotechnology in forensic
MerinAliceGeorge
 

Similar to Southern blot power point (20)

Southern blotting
Southern blottingSouthern blotting
Southern blotting
 
VBC-321_BLOTTING_TECHNIQUES and gel electrophoresis
VBC-321_BLOTTING_TECHNIQUES and gel electrophoresisVBC-321_BLOTTING_TECHNIQUES and gel electrophoresis
VBC-321_BLOTTING_TECHNIQUES and gel electrophoresis
 
Lecture 3 southern blotting
Lecture 3 southern blotting Lecture 3 southern blotting
Lecture 3 southern blotting
 
Southern-blotting-and-Western-blotting.pptx
Southern-blotting-and-Western-blotting.pptxSouthern-blotting-and-Western-blotting.pptx
Southern-blotting-and-Western-blotting.pptx
 
southern blotting.pptx
southern blotting.pptxsouthern blotting.pptx
southern blotting.pptx
 
blooting image.pptx
blooting image.pptxblooting image.pptx
blooting image.pptx
 
Southern blotting
Southern blottingSouthern blotting
Southern blotting
 
Southern blotting
Southern blottingSouthern blotting
Southern blotting
 
Blotting Techniques
Blotting TechniquesBlotting Techniques
Blotting Techniques
 
Blotting techniques1
Blotting techniques1Blotting techniques1
Blotting techniques1
 
VBC-321_BLOTTING_TECHNIQUES.pptx
VBC-321_BLOTTING_TECHNIQUES.pptxVBC-321_BLOTTING_TECHNIQUES.pptx
VBC-321_BLOTTING_TECHNIQUES.pptx
 
Blotting techniques
Blotting techniquesBlotting techniques
Blotting techniques
 
Human genome project
Human genome projectHuman genome project
Human genome project
 
Souther and northern blotting systems
Souther and northern blotting systemsSouther and northern blotting systems
Souther and northern blotting systems
 
Blotting techniques
Blotting techniquesBlotting techniques
Blotting techniques
 
Blotting techniques.pptx
Blotting techniques.pptxBlotting techniques.pptx
Blotting techniques.pptx
 
Southern blotting-1.pptx
Southern  blotting-1.pptxSouthern  blotting-1.pptx
Southern blotting-1.pptx
 
Southern blot
Southern blotSouthern blot
Southern blot
 
Southern blotting
Southern blottingSouthern blotting
Southern blotting
 
Application of biotechnology in forensic
Application of biotechnology in forensicApplication of biotechnology in forensic
Application of biotechnology in forensic
 

Recently uploaded

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Southern blot power point

  • 2. WHAT IS SOUTHERN BLOTTING?  A process used for DNA analysis  Developed by Edwin Southern in 1975  Is also referred to as DNA blotting Edwin Southern
  • 3. USE IN GENETICALLY MODIFIED ORGANISMS  In genetically modified organisms, Southern blots are used to make certain that the necessary section of DNA has been inserted into the genome of the organism being modified.
  • 4. STEP 1  DNA is separated from it’s source and cut with a restriction enzyme.
  • 5. STEP 2  The fragments are put into a gel and are sorted by electrophoresis in order of length, the shortest at the top and the longest at the bottom.
  • 6. STEP 3  Ethidium bromide is then used to make the fragments visible, and the DNA is taken from the gel and placed in a nylon filter.
  • 7. STEP 4  Then a radioactive probe is added, which binds to complementary DNA fragments.
  • 8. STEP 5  The nylon membrane is then covered with an X- ray film which, when developed, reveals the position of the radioactive probe.