Jump to content

Rigor and Transparancy: Authentication of Key Biological Resources example


Recommended Posts

NIH guidelines for rigor and transparency were discussed at the professional development session on Sunday at SfN 2016 (3-5pm).

Lots of examples for how grants will be reviewed and scored in the future were included, but we have been asked several times for the ‘authentication of key biological resources’ example that our library has put together and was used in the last talk.

Please find the link below:

The document is an example of many possible authentication methods and centers on:

  1. properly identifying the research resource / checking with authoritative database for known problems
  2. methods for authenticating the research resource (cell lines and antibodies)

These should be standard methods, but if you are looking for an example it may be a good place to start.

Link to comment
Share on other sites


  • Create New...