Search results

From LIMSWiki
Jump to navigationJump to search
Results 41 – 61 of 131
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • ...ional Information Assurance (IA) Glossary |publisher=Committee on National Security Systems |pages=4 |date=26 April 2010 |archivedate=15 April 2012 |accessdate ...pter=Chapter 2: Related Research in Insider Computer Fraud and Information Security Controls |year=2007 |pages=18–19 |publisher=CRC Press |url=https://books.
    5 KB (723 words) - 23:14, 5 January 2022
  • ...erying in a distributed LIMS platform|One tool to find them all: A case of data integration and querying in a distributed LIMS platform]]"''' ...in multiple databases. ('''[[Journal:One tool to find them all: A case of data integration and querying in a distributed LIMS platform|Full article...]]''
    18 KB (2,533 words) - 15:36, 2 January 2024
  • ...occur in and to the virtualized [[data center]] due to lack of control of data flow over the public Internet.<ref name="KontronWP">{{cite web |url=http:// ...NIST-Draft-SP-800-144_cloud-computing.pdf |format=PDF |title=Guidelines on Security and Privacy in Public Cloud Computing |author=Jansen, Wayne; Grance, Timoth
    7 KB (905 words) - 14:31, 20 October 2014
  • ...the guide, as was more up-to-date information about return on investment, data management practices, and quality assurance. Second, we're dipping our toes ...cloud applications in the lab. It also addresses the usefulness of managed security services before getting into selecting them and other cloud providers, and
    60 KB (8,899 words) - 00:05, 12 April 2024
  • ...n research. The samples may also include personal medical and genealogical data. Sites for these collections come in different forms, typically based on th ...lyzed in previously used systems. Furthermore, samples in biobanks and the data derived from those samples can often be used by multiple researchers for mu
    22 KB (2,973 words) - 19:44, 4 August 2014
  • ...2009 map shows number of swine flu cases per U.S. county. Collecting such data and clearly representing it is just one of the various challenges facing in ...e field has expanded over time from analyzing [[public health laboratory]] data for potential disease vectors to a more robust syndromic surveillance of ep
    9 KB (1,179 words) - 19:53, 11 June 2014
  • * [[Information management|data management]] ====Data management====
    33 KB (4,484 words) - 17:21, 18 September 2022
  • .../pdf/2013-01073.pdf |format=PDF |title=Modifications to the HIPAA Privacy, Security, Enforcement, and Breach Notification Rules Under the Health Information Te :Subtitle C - Data Collection
    20 KB (2,906 words) - 00:43, 8 January 2022
  • ...of instruments, software, and data management tools that allow scientific data to be captured, migrated, processed, and interpreted for immediate use, as
    15 KB (1,928 words) - 19:13, 27 March 2024
  • ...alf of U.S. states in May 1997 on the State Electronic Commerce/Electronic Data Interchange Steering Committee (SEES) and a series of conferences starting ...rent/title-40/part-3 How will EPA provide notice of changes to the Central Data Exchange?]
    8 KB (1,078 words) - 20:45, 19 January 2022
  • ...anized regulations concerning how laboratories handled licensing, testing, data management, and various other aspects of operating a cannabis testing labor ...ed license holder, mailing address, site details, site personnel, physical security, and record keeping details. The application guide should be followed for t
    27 KB (3,398 words) - 17:06, 27 December 2023
  • ...ic signatures]]. Within this part, requirements are created to help ensure security, integrity, and confidentially of electronic records and to ensure electron ...is primarily includes data to be maintained by the FDA predicate rules and data used to demonstrate compliance to a predicate rule. (A predicate rule is an
    15 KB (1,999 words) - 01:54, 28 March 2024
  • ...ata-improves-care/ |title=Health Informatics in Haiti: Improving Access to Data Improves Care |publisher=University of Washington I-TECH |date=March 2011 | ...re Interoperability Resources (FHIR)|FHIR API]], ASTM analyzer interfaces, data warehousing, and more.<ref name="Liams-HauserOpenELISSoft22" />
    21 KB (2,802 words) - 20:09, 28 March 2022
  • ...onducted by Mathematica Policy Research in 1991 and again in 1995 provided data that suggested "that CLIA '88 was primarily responsible for the reduction o ...implement measures that prevent the unauthorized disclosure and access to data in the laboratory.
    55 KB (7,634 words) - 19:45, 17 May 2022
  • {{wikipedia::Information security}} [[Category:Computer security]]
    375 bytes (49 words) - 21:21, 21 June 2016
  • {{wikipedia::Cloud computing security}} [[Category:Computer security]]
    412 bytes (54 words) - 21:23, 21 June 2016
  • {{wikipedia::Information security management}} [[Category:Computer security]]
    397 bytes (51 words) - 21:49, 21 June 2016
  • {{wikipedia::Information technology security audit}} [[Category:Computer security]]
    450 bytes (58 words) - 21:55, 21 June 2016
  • {{wikipedia::Web application security}} [[Category:Computer security]]
    424 bytes (56 words) - 17:43, 10 August 2016
  • ...-through-big-data/ |title=Tracking America's Cannabis Industry Through Big Data |author=Martinez, D.; Pflueger, D.; Palermo, T.; Brown, D. |work=Forbes |da * '''security mechanisms''': Access restrictions are important to meeting regulatory and
    12 KB (1,614 words) - 17:07, 27 December 2023

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)