The largest database of trusted experimental protocols

Non target control lentiviral vectors

Manufactured by Merck Group

Non-target control lentiviral vectors are laboratory tools used to assess the effects of lentiviral transduction in cell culture experiments. These vectors do not contain a transgene and serve as a control for determining the impact of the lentiviral transduction process itself, independent of the effects of the expressed gene of interest.

Automatically generated - may contain errors

2 protocols using non target control lentiviral vectors

1

Lentiviral Vector Transduction of Cell Lines

Check if the same lab product or an alternative is used in the 5 most similar protocols
pMD-VSV-G and delta 8.2 plasmids were gifts from Dr. Dong at Tulane University. Plasmid maps are shown in Supplementary Figure 2. EGFR and non-target control lentiviral vectors were purchased from Sigma-Aldrich. Transfection was performed using Lipofectamine 3000 reagent (Invitrogen, USA) according to the manufacturer’s instructions. Briefly, a lentivirus vector, pMD-VSV-G, and delta 8.2 were cotransfected into TLA-HEK293T cells, and the culture medium was harvested 72 h post-transfection. BxPC-3 and HPAC cells were transduced by adding virus supernatant and polybrene (Sigma-Aldrich) for 3 h. Cells were harvested 5 days after lentiviral infection and used for subsequent analysis.
+ Open protocol
+ Expand
2

Lentiviral Transduction of BxPC-3 Cells

Check if the same lab product or an alternative is used in the 5 most similar protocols
The pMD-VSV-G and delta 8.2 plasmids were gifts from Dr. Dong at Tulane University. Wee1 and non-target control lentiviral vectors were purchased from Sigma-Aldrich. Lentivirus production and transduction of BxPC-3 cells were carried out as previously described [28 (link)].
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!