Resource Library

Whitepapers

Optimizing sialic acid clone screening through a high throughput lectin assay

Optimizing_siliac_acid_clone_screening_through_a_high_throughput_lectin_assay_thumbnail.png
 

As glycosylation can significantly impact protein stability, folding, and solubility during early development, establishing a robust glycosylation control strategy is critical to ensure success. 

 

In this whitepaper, we discuss how the implementation of high-throughput lectin assay can lower immunogenicity and optimize pharmacokinetics and pharmacodynamics for recombinant therapeutics. 

Optimizing_siliac_acid_clone_screening_through_a_high_throughput_lectin_assay_thumbnail.png
 

As glycosylation can significantly impact protein stability, folding, and solubility during early development, establishing a robust glycosylation control strategy is critical to ensure success. 

 

In this whitepaper, we discuss how the implementation of high-throughput lectin assay can lower immunogenicity and optimize pharmacokinetics and pharmacodynamics for recombinant therapeutics.

SITE MAP

close
Close

Your download is ready

Click Download.

Close

Subscribe to Our Newsletter

Please fill in your details, select one or more areas of interest, and click the subscribe button to receive our newsletter.

Subscribe to Our Newsletter
  • Privacy Policy to collect the email address that I have provided until I withdraw my consent. The collected information will only be used for the purpose of mailing service. If you do not wish to consent, you will not be able to receive the newsletter. Samsung Biologics respects the privacy of its subscribers.
Close

Please fill out the form
to view the full content

Please sign up to view the post..
* Required
Privacy Policy
close

SECURITY REPORT

Your valuable comments contribute to protecting Samsung Biologic’s core technology and management information, as well as reinforcing domestic competency and economic development.

  • This page is created for reporting core technology and management information leakage.
  • The reported contents as well as the identity of the reporter are strictly secured.
THE MANUAL FOR SECURITY NOTIFICATION