GH9-lk-v, GH9-v, GH48-lk-t, GH48-t were synthesized in pET21a by GenScript (USA). All enzymes were equipped with a His-Tag for purification by immobilized metal ion affinity chromatography (IMAC). The monovalent scaffoldins ScafT, ScafG, and ScafV and the trivalent scaffoldin ScafGTV were described previously [33 (link), 55 (link)–57 (link)]. Competent Escherichia coli XL1 cells were used for plasmid maintenance and production.
Cloning and Characterization of Thermostable Cellulases
GH9-lk-v, GH9-v, GH48-lk-t, GH48-t were synthesized in pET21a by GenScript (USA). All enzymes were equipped with a His-Tag for purification by immobilized metal ion affinity chromatography (IMAC). The monovalent scaffoldins ScafT, ScafG, and ScafV and the trivalent scaffoldin ScafGTV were described previously [33 (link), 55 (link)–57 (link)]. Competent Escherichia coli XL1 cells were used for plasmid maintenance and production.
Corresponding Organization :
Other organizations : Weizmann Institute of Science, National and Kapodistrian University of Athens, National Renewable Energy Laboratory
Variable analysis
- Cloning of endoglucanase Cel5D with and without its CBM28
- Cloning of GH5-g, GH5-t and GH5-v in pET28a
- Cloning of GH9-lk-v, GH9-v, GH48-lk-t, GH48-t in pET21a
- Enzymatic activity of the cloned proteins
- Use of genomic DNA of Ca. bescii (DSM 6725) as a template for cloning
- Use of Phusion High Fidelity DNA polymerase for PCR
- Use of Fastdigest enzymes for plasmid and PCR product synthesis
- Use of T4 DNA ligase for ligation
- Use of HiYield™ Gel/PCR Fragments extraction kit for PCR product purification
- Use of His-Tag for protein purification by IMAC
- Use of Escherichia coli XL1 cells for plasmid maintenance and production
- Not specified
- Not specified
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!