Immunofluorescence for FoxP3 (clone FJK-16s; eBioscience), CD8 (clone 4SM15; eBioscience), and Ki-67 (clone SP6; Thermo Scientific) was performed as previously described21 (link). Secondary antibodies (AF488 donkey anti-rabbit IgG, AF647 goat anti-rat IgG) were from Life Technologies. Tissues were counterstained with DAPI (Invitrogen). Images were acquired on a Nikon Eclipse Ni microscope using NIS Elements software, and 5–10 fields were analyzed per tumor.
Multiplex Immunostaining for Tumor Analysis
Partial Protocol Preview
This section provides a glimpse into the protocol.
The remaining content is hidden due to licensing restrictions, but the full text is available at the following link:
Access Free Full Text.
Corresponding Organization : Broad Institute
Other organizations : Washington University in St. Louis, Baylor College of Medicine, Center for Systems Biology
Variable analysis
- Immunostaining for Ki-67 (Vector), HER2 (AB16901; Abcam), and STAT1 (AB47425; Abcam)
- Immunofluorescence for FoxP3 (clone FJK-16s; eBioscience), CD8 (clone 4SM15; eBioscience), and Ki-67 (clone SP6; Thermo Scientific)
- Images acquired with a Yokogawa spinning disk confocal on an inverted Nikon Ti fluorescence microscope using MetaMorph image acquisition software
- Images acquired on a Nikon Eclipse Ni microscope using NIS Elements software
- Secondary antibodies (AF488 AffiniPure donkey anti-mouse IgG, Cy3 AffiniPure donkey anti-rabbit IgG) from Jackson ImmunoResearch Laboratories
- Secondary antibodies (AF488 donkey anti-rabbit IgG, AF647 goat anti-rat IgG) from Life Technologies
- Tissues counterstained with DAPI (Invitrogen)
- Positive controls: Not explicitly mentioned
- Negative controls: Not explicitly mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!