After 24 h of co-cultivation, UniCAR T cells were further examined with respect to their activation status. For this purpose, cells of one triplicate were pooled and stained with anti-human CD3-PE-Vio®770 or CD3-VioBlue and anti-human CD69-APC Abs (all Miltenyi Biotec GmbH) for 15 min at 4 °C. To allow exclusion of dead cells during analysis, counterstaining with 1 μg/mL propidium iode/PBS solution was performed. Flow cytometric data were acquired with the MACSQuant Analyzer 10 (Miltenyi Biotec GmbH).
Cytokine Secretion and T Cell Activation in UniCAR-Mediated Tumor Targeting
After 24 h of co-cultivation, UniCAR T cells were further examined with respect to their activation status. For this purpose, cells of one triplicate were pooled and stained with anti-human CD3-PE-Vio®770 or CD3-VioBlue and anti-human CD69-APC Abs (all Miltenyi Biotec GmbH) for 15 min at 4 °C. To allow exclusion of dead cells during analysis, counterstaining with 1 μg/mL propidium iode/PBS solution was performed. Flow cytometric data were acquired with the MACSQuant Analyzer 10 (Miltenyi Biotec GmbH).
Variable analysis
- Recombinant Abs were added at a concentration of 5 nM.
- Secreted cytokines (TNF, IFN-Gamma, IL-2) were analyzed by ELISA after 24 h of co-cultivation.
- UniCAR T cell activation status (CD69 expression) was examined after 24 h of co-cultivation.
- 5 × 10^4 UniCAR T cells were incubated alone or in the presence of 1 × 10^4 tumor cells in a 96-well U-bottom plate.
- Co-cultivation time was 24 h.
- Negative control: UniCAR T cells incubated alone (without tumor cells).
- Positive control: UniCAR T cells incubated with tumor cells (in the absence of recombinant Abs).
Annotations
Based on most similar protocols
As authors may omit details in methods from publication, our AI will look for missing critical information across the 5 most similar protocols.
About PubCompare
Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.
We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.
However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.
Ready to get started?
Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required
Revolutionizing how scientists
search and build protocols!