Macsibeads
MACSiBeads are magnetic beads used for the separation and enrichment of specific cell types and biomolecules in research and diagnostic applications. The beads are coated with antibodies or ligands that can bind to target cells or molecules, allowing their isolation or depletion from complex samples.
Lab products found in correlation
8 protocols using macsibeads
Treg Cell Suppression Assay Protocol
Purification and Activation of Mouse T Cells
Functional Assay of NK Cell Activation
Magnetic Bead-Bound Activation Reagents
Activation and Phenotyping of Mouse T-cells
Activated T-cells were stimulated with S100A4 protein (1 μg/ml) or S100A4 protein mixed with 6B12 antibody (6 μg/ml). Before fixation, PMA/Ionomycin and Golgistop™ (BD Biosciences) were added for 5 hours. Cells were washed with PBS and Fixable Viability Stain 450 (BD Biosciences) was added to discriminate between viable and dead cells.
Cells were fixed using the Cytofix/Cytoperm™ kit (BD Biosciences) and stained with the mouse Th1/Th2/Th17 phenotyping kit (BD Biosciences) containing antibodies against CD4, IL17A, IFNγ and IL4 according to the manufacturer’s instructions. Data acquisition and analysis were performed on a FACSVerse (BD Biosciences) using FlowJo software (Tree Star). All experiments were repeated 3-5 times.
Isolation and Activation of Murine T Cells
Isolation and Activation of Murine T Cells
nodes from male and female mice aged 6–12 weeks by negative selection
with biotinylated antibodies (CD8, CD19, B220, CD11b, CD11c, DX5, Ter119 and
CD24, UCSF Monoclonal Antibody Core) and magnetic anti-Biotin beads (MACSi
Beads, Miltenyi Biotec). For IL-2 stimulation, purified T cells were
pre-activated on 96-well plates coated with anti-CD3 (2C11) and anti-CD28
(37.51) for 72 hours, removed and cultured with rhIL-2 (100 u/mL, Roche) for 36
hours, and then cultured without rhIL-2 for the 36 hours prior to all
experiments.
T Cell Purification from Murine Tissues
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!