The largest database of trusted experimental protocols

Pcdh cmv lentiviral vector

Manufactured by System Biosciences
Sourced in United States

The PCDH-CMV lentiviral vectors are a set of lentiviral expression constructs designed for the stable expression of proteins of interest in target cells. The vectors utilize the cytomegalovirus (CMV) promoter to drive high-level constitutive expression of the gene of interest. The vectors are based on the PCDH backbone, which provides efficient transduction and integration into the host cell genome.

Automatically generated - may contain errors

4 protocols using pcdh cmv lentiviral vector

1

Establishment of cell lines with modulated RARα

Check if the same lab product or an alternative is used in the 5 most similar protocols
NB4 [60 (link)], HL-60 [61 (link)] and COS-7 cells were cultured as described [36 (link), 62 (link), 63 (link)]. We generated NB4 cell populations silenced for PML-RAR and the RARα isoforms infecting cells with the SCRsh, PMRsh, RA1sh and RA2sh retroviral vectors according to standard protocols (System Biosciences). Following infection, NB4 cells were selected in RPMI medium containing 10% bovine serum and puromycin (1.0 μg/ml) for at least 15 days. Only NB4 cell populations characterized by >95% positivity to GFP following FACS analysis were considered. Subsequent passages of the cell populations were performed in complete RPMI medium containing puromycin (0.5 μg/ml). To isolate NB4 populations over-expressing RARα2, cells were electroporated with pCDH-CMV lentiviral vectors (System Biosciences) containing RARα2 (pRA2) using Neon Transfection (Invitrogen, Life Technologies). HL-60 cells were infected as above with the RA2sh, SCRsh or the void (Void) retroviral vector.
+ Open protocol
+ Expand
2

Silencing and Overexpression of S100A3

Check if the same lab product or an alternative is used in the 5 most similar protocols
The source of the cell lines and the infection procedures are described in Supplementary Methods. We generated SK-BR-3, A549, HL-60, and NB4 cell populations silenced for S100A3 with lentiviral vectors (pGREENpuro, System Biosciences) containing the shRNA. To isolate NB4 populations over-expressing S100A3, cells were infected with pCDH-CMV lentiviral vectors (System Biosciences) containing the human S100A3 cDNA. To this purpose, S100A3 was inserted in the XbaI and NotI sites of pCDH-CMV.
+ Open protocol
+ Expand
3

Production and Transduction of Lentiviral Vectors

Check if the same lab product or an alternative is used in the 5 most similar protocols
cDNA encoding human miR-587 precursor (~300 bp) was cloned into pCDH-CMV lentiviral vector purchased from System Biosciences (SBI, Mountain View, CA, USA). PPP2R1B lentiviral expression vector was purchased from GeneCopoeia, Inc. (Rockville, MD, USA). Packaging cells (293) were co-transfected with pPackH1 packaging plasmid mix (SBI) and the lentiviral vectors using Fugene HD (Promega). Viruses were harvested 48 h later to infect target cells.
+ Open protocol
+ Expand
4

Construction of miR-424 Expression Vector

Check if the same lab product or an alternative is used in the 5 most similar protocols
To construct miR-424 expression vector, two oligonucleotides [5′-TCGACAGCAGCAATTCATGTTTTGAAGTGTGCTGTCCTTCAAAACATGAATTGCTGCTGTTTTT-3′ (forward) and 5′-AATTAAAAACAGCAGCAATTCATGTTTTGAAGGACAGCACACTTCAAAACATGAATTGCTGCTG-3′ (reverse)] were synthesized and cloned into pCDH-CMV lentiviral vector (System Biosciences, Mountain View, CA, USA). Lentiviral expression vectors for UNC5B and SIRT4 were purchased from System Biosciences. 293 T cells were co-transfected with pPackH1 packaging plasmid mix (System Biosciences) and the indicated lentiviral vectors using Fugene HD transfection reagent following the manufacturer’s protocols (Promega). Forty-eight hours after transfection, the lentivirus particles were harvested.
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!