Proprietary protocols developed at REGENXBIO (REGENXBIO Inc. Rockville, MD, USA) were followed to produce all research-grade AAV vectors used in the studies described here. Briefly, triple transfection of HEK293 cells was performed with the AAV8 capsid plasmid, helper plasmid, and the respective transgene plasmid. Affinity chromatography was performed on cell culture supernatant, and the purified vectors were titered utilizing Digital Droplet PCR (Biorad, Hercules, CA, USA).
AAV Vector Production and Characterization
Proprietary protocols developed at REGENXBIO (REGENXBIO Inc. Rockville, MD, USA) were followed to produce all research-grade AAV vectors used in the studies described here. Briefly, triple transfection of HEK293 cells was performed with the AAV8 capsid plasmid, helper plasmid, and the respective transgene plasmid. Affinity chromatography was performed on cell culture supernatant, and the purified vectors were titered utilizing Digital Droplet PCR (Biorad, Hercules, CA, USA).
Protocol cited in 1 other protocol
Variable analysis
- The type of promoter used (TBG promoter or ubiquitous CAG promoter with a cytomegalovirus enhancer element, a chicken β-actin promoter, and an intron)
- The type of hGALNS sequence used (D8-hGALNS or native hGALNS)
- Enzymatic activity of hGALNS in Huh7 cells
- All hGALNS sequences were codon-optimized
- The D8-hGALNS region contained a bone-targeting aspartic acid octapeptide (GACGACGATGATGACGATGACGAC) preceding the codon-optimized hGALNS
- The hGALNS sequences were incorporated into the vector upstream of a rabbit β-globin polyadenylation tail
- Not explicitly mentioned
- Not explicitly mentioned
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!