Search results
From LIMSWiki
Jump to navigationJump to search
- ...om Intel reviews the inner workings of Facebook's first built-from-scratch data center in 2013.]] ...e="GlanzData">{{cite web |url=http://www.nytimes.com/2012/09/23/technology/data-centers-waste-vast-amounts-of-energy-belying-industry-image.html |title=Pow31 KB (4,327 words) - 22:37, 27 August 2014
- ...ts and services, representing virtual computing, networking, data storage, security management, container management, media management, and managed and profess 5. '''Where are your servers located, and how is data securely transferred to and from those servers?'''19 KB (2,666 words) - 22:56, 28 February 2024
- ...owards a risk catalog for data management plans|Towards a risk catalog for data management plans]]"''' ...nagement planning can be reduced. ('''[[Journal:Towards a risk catalog for data management plans|Full article...]]''')<br />46 KB (6,344 words) - 15:34, 2 January 2024
- ...ly managed in a pay-per-use model at the edge, in colocations, and in your data center."<ref name="HPEMeetHPEGreen">{{cite web |url=https://www.hpe.com/us/ ..., some of the questions from Chapter 5 (e.g., "How segregated is our cloud data from another customer's") are not relevant, as they are not providing publi16 KB (2,271 words) - 22:54, 28 February 2024
- | name = BT Cyber Security Platform | services = Security management, advanced threat services, security monitoring, vulnerability management5 KB (604 words) - 22:51, 28 February 2024
- | name = Wipro Managed Security Services ...ponse, DDoS mitigation, intrusion detection<br /> and prevention, endpoint security, firewall management5 KB (613 words) - 23:00, 28 February 2024
- ...ers.<ref name="DellEMCCloud">{{cite web |url=https://www.dell.com/en-us/dt/data-protection/powerprotect-dd-series/cloud-tier.htm |title=Dell Cloud Tier |pu ..., some of the questions from Chapter 5 (e.g., "How segregated is our cloud data from another customer's") are not relevant, as they are not providing publi18 KB (2,498 words) - 22:52, 28 February 2024
- ...omputing, networking, content delivery, data storage, database management, security management, enterprise management, container management, developer support, 5. '''Where are your servers located, and how is data securely transferred to and from those servers?'''17 KB (2,270 words) - 17:31, 2 August 2023
- ...ing technology, while the computing resources are consolidated at a remote data center location; in other cases, entire business applications have been cod ...ww.cnet.com/news/the-new-geek-chic-data-centers/ |title=The new geek chic: Data centers |author=Farber, D. |work=CNET |publisher=CBS Interactive |date=25 J40 KB (5,252 words) - 21:08, 19 September 2022
- ...images|Personalized Oncology Suite: Integrating next-generation sequencing data and whole-slide bioimages]]"''' ...ournal:Personalized Oncology Suite: Integrating next-generation sequencing data and whole-slide bioimages|Full article...]]''')<br />84 KB (12,104 words) - 18:55, 12 April 2024
- ...thumb|400px|right|Laboratories around the world depend on a LIMS to manage data, assign rights, manage inventory, and more.]] ...low|workflow]] and data tracking support, flexible architecture, and smart data exchange interfaces, which fully "support its use in regulated environments50 KB (6,874 words) - 23:58, 11 April 2024
- ...m/top-100-managed-security-service-providers-mssps/ |title=Top 100 Managed Security Service Providers (MSSPs) |work=Cyber Defense Magazine |publisher=Cyber Def ==Managed security services==5 KB (522 words) - 22:53, 28 February 2024
- | name = Verizon Managed Security Services | homepage = {{URL|hhttps://www.verizon.com/business/products/security/}}5 KB (523 words) - 22:59, 28 February 2024
- | name = Atos Managed Security Services | services = Managed detection and response, security operation center,<br />and CERT services4 KB (438 words) - 22:50, 28 February 2024
- ...d identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or m *Are cloud vendors evaluated for security and compliance with appropriate regulations?17 KB (2,440 words) - 16:58, 22 August 2014
- ...ing/sequencing, [[proteomics]], specimen tracking, and observational study data management.<ref name="LK_Docs">{{cite web |url=https://www.labkey.org/Docum ...rotein database search functionality, comprehensive experiment annotation, data sharing, and several proteomic-friendly analytic tools.<ref>{{cite web |url22 KB (2,912 words) - 20:54, 31 May 2024
- * Ensure adequate privacy and security #Protect electronic health information (privacy & security).17 KB (2,264 words) - 19:54, 19 September 2021
- ...rs to document, store, retrieve, and share fully electronic [[laboratory]] data and information—usually research-based—"in ways that meet all legal, re ...e, manage, securely share, and permanently archive and retrieve all common data and records generated by research and development and testing labs."<ref na30 KB (4,184 words) - 22:49, 11 March 2024
- ...ecause no data is saved to the user's device, chances are low any critical data can be retrieved and compromised if the device is lost. ('''[[Desktop virtu ...and clinics) and their associated labs by managing and reporting critical data concerning "the status of infection, immunology, and care and treatment sta55 KB (7,827 words) - 15:38, 2 January 2024
- ...rld depend on a laboratory information system to manage and report patient data and test results.]] ...and clinics) and their associated labs by managing and reporting critical data concerning "the status of infection, immunology, and care and treatment sta31 KB (4,113 words) - 22:15, 4 April 2024