*****
To join, leave or search the confocal microscopy listserv, go to:
http://lists.umn.edu/cgi-bin/wa?A0=confocalmicroscopy
*****
Hi Holly, thanks for the invitation to attend the Advanced Imaging
Methods Workshop. I would very much like to go, but have not decided
yet.
I wanted to ask your opinion. We are replacing the Fujitsu "green
monster" computers that operate our LSM 510 confocal microscopes. The
Zeiss service rep suggests that he should install the software. It will
cost around $255/hour for his service. * If you purchase your own
computer they will not install the software under the umbrella of the
service contract.
Would you hire Zeiss service to install the software or do you think
that you would install it yourself?
Thanks,
Brian D Armstrong PhD
Light Microscopy Core Manager
Beckman Research Institute
City of Hope
Dept of Neuroscience
1450 E Duarte Rd
Duarte, CA 91010
626-256-4673 x62872
http://www.cityofhope.org/research/support/Light-Microscopy-Digital-Imag
ing/Pages/default.aspx
<http://www.cityofhope.org/research/support/Light-Microscopy-Digital-Ima
ging/Pages/default.aspx>
---------------------------------------------------------------------
SECURITY/CONFIDENTIALITY WARNING:
This message and any attachments are intended solely for the individual or entity to which they are addressed. This communication may contain information that is privileged, confidential, or exempt from disclosure under applicable law (e.g., personal health information, research data, financial information). Because this e-mail has been sent without encryption, individuals other than the intended recipient may be able to view the information, forward it to others or tamper with the information without the knowledge or consent of the sender. If you are not the intended recipient, or the employee or person responsible for delivering the message to the intended recipient, any dissemination, distribution or copying of the communication is strictly prohibited. If you received the communication in error, please notify the sender immediately by replying to this message and deleting the message and any accompanying files from your system. If, due to the security risks, you do not wish to receive further communications via e-mail, please reply to this message and inform the sender that you do not wish to receive further e-mail from the sender.
---------------------------------------------------------------------
|