The largest database of trusted experimental protocols

Zen 3.3 blue software

Manufactured by Zeiss

ZEN 3.3 blue is a software package for operating Zeiss microscope systems. It provides a user interface and tool suite for controlling microscope hardware, acquiring images, and performing basic image analysis.

Automatically generated - may contain errors

2 protocols using zen 3.3 blue software

1

Image Analysis Protocols for Microscopy

Check if the same lab product or an alternative is used in the 5 most similar protocols
2D epifluorescence images were proceeded using ZEN 3.3 blue software (Zeiss). 3D acquired from confocal and multiphoton microscopes were proceeded using NIS-Elements software package. (5.30.03 Nikon Instruments Inc., Nikon Europe B.V., Amsterdam, Netherland). 3D Images acquired from light sheet were proceeded using Imaris software (9.1.2, Oxford Instruments, Abingdon, UK).
Data were analyzed using the GraphPad Prism v5.0 statistical software package (GraphPad Software, La Jolla, CA, USA). Since the data were non normally distributed (normality tested using Shapiro-Wilk test) the non-parametric Mann-Whitney test has been chosen. Significance is depicted (** p<0.01, **** p<0.0001).
+ Open protocol
+ Expand
2

Adenoviral Vector-Mediated Gene Delivery

Check if the same lab product or an alternative is used in the 5 most similar protocols
Ad5mK8-nlsCre (VVC-Li-535; University of Iowa Viral Vector Core) was diluted in DMEM with CaCl2 (10 mM) and introduced into the fourth mammary ducts at a titer of ~1.92 × 107 pfu/duct using 100 µL Nanofil syringes (World Precision Instruments) fitted with 35 G Nanofil needles (World Precision Instruments). Live animal and organ imaging was performed using an IVIS Spectrum imaging system (Perkin Elmer). Imaging of lung metastases was performed on a Zeiss Axio Observer.Z1 microscope with Zeiss ZEN 3.3 Blue software.
+ Open protocol
+ Expand

About PubCompare

Our mission is to provide scientists with the largest repository of trustworthy protocols and intelligent analytical tools, thereby offering them extensive information to design robust protocols aimed at minimizing the risk of failures.

We believe that the most crucial aspect is to grant scientists access to a wide range of reliable sources and new useful tools that surpass human capabilities.

However, we trust in allowing scientists to determine how to construct their own protocols based on this information, as they are the experts in their field.

Ready to get started?

Sign up for free.
Registration takes 20 seconds.
Available from any computer
No download required

Sign up now

Revolutionizing how scientists
search and build protocols!