Pvsv g vector
The PVSV-G vector is a lentiviral vector designed for the production of pseudotyped lentiviral particles. The core function of this vector is to provide the envelope glycoprotein (G protein) from the Vesicular Stomatitis Virus (VSV-G), which is used to pseudotype lentiviral particles, enabling them to transduce a wide range of cell types.
Lab products found in correlation
8 protocols using pvsv g vector
EGFR Mutant Viral Transduction in Ba/F3 Cells
Generating Girdin knockdown 293FT cell line
Lentiviral Transduction of PC-9/BRc1 Cells
Stable PtK1 Cell Line Expressing H2B-PAGFP
Generation of METex14 Ba/F3 clones
Transfection was applied to Ba/F3 parental cells and Hs746t cells to generate in vitro models of METex14 plus one of the secondary mutations (D1228H/N/V/Y or Y1230H) as described previously [16 (link)]. Briefly, pRetroX IRES-ZsGreen1 carrying METex14 was used as a template, and the retroviral vector constructs encoding METex14 plus point mutations (D1228H/N/V/Y and Y1230H) were generated by a Prime STAR mutagenesis basal kit (Takara). All mutations were confirmed by direct sequencing. The viral particles were generated by co-transfection of these retroviral vector and the pVSV-G vector (Clontech) into Gp2-293 cells and were added to Ba/F3 and Hs746t cells. Ba/F3 cells and Hs746t cells infected with the retrovirus were collected using green fluorescence protein (GFP)-based fluorescence-activated cell sorting by a BD FACS Aria cell sorter (special order research product; BD Biosciences).
Retroviral and Lentiviral Particle Production
Lentiviruses encoding shRNA, siRNAs and controls were purchased from Dharmacon (Lafayette, USA). Target cells were transduced at MOI = 1.
Cells stably expressing the construct were selected by G418 (400 µg/ml) or puromycin (1 µg/ml) for 7 days.
Efficient TCR Transduction and Jurkat Assay
TCRa/b Transduction of Jurkat and CD8+ T Cells
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!