Search results

From LIMSWiki
Jump to navigationJump to search
Results 51 – 71 of 131
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • ...alf of U.S. states in May 1997 on the State Electronic Commerce/Electronic Data Interchange Steering Committee (SEES) and a series of conferences starting ...rent/title-40/part-3 How will EPA provide notice of changes to the Central Data Exchange?]
    8 KB (1,078 words) - 20:45, 19 January 2022
  • ...ic signatures]]. Within this part, requirements are created to help ensure security, integrity, and confidentially of electronic records and to ensure electron ...is primarily includes data to be maintained by the FDA predicate rules and data used to demonstrate compliance to a predicate rule. (A predicate rule is an
    15 KB (1,999 words) - 01:54, 28 March 2024
  • ...ata-improves-care/ |title=Health Informatics in Haiti: Improving Access to Data Improves Care |publisher=University of Washington I-TECH |date=March 2011 | ...re Interoperability Resources (FHIR)|FHIR API]], ASTM analyzer interfaces, data warehousing, and more.<ref name="Liams-HauserOpenELISSoft22" />
    21 KB (2,802 words) - 20:09, 28 March 2022
  • ...onducted by Mathematica Policy Research in 1991 and again in 1995 provided data that suggested "that CLIA '88 was primarily responsible for the reduction o ...implement measures that prevent the unauthorized disclosure and access to data in the laboratory.
    55 KB (7,634 words) - 19:45, 17 May 2022
  • {{wikipedia::Information security}} [[Category:Computer security]]
    375 bytes (49 words) - 21:21, 21 June 2016
  • {{wikipedia::Cloud computing security}} [[Category:Computer security]]
    412 bytes (54 words) - 21:23, 21 June 2016
  • {{wikipedia::Information security management}} [[Category:Computer security]]
    397 bytes (51 words) - 21:49, 21 June 2016
  • {{wikipedia::Information technology security audit}} [[Category:Computer security]]
    450 bytes (58 words) - 21:55, 21 June 2016
  • {{wikipedia::Web application security}} [[Category:Computer security]]
    424 bytes (56 words) - 17:43, 10 August 2016
  • ...-through-big-data/ |title=Tracking America's Cannabis Industry Through Big Data |author=Martinez, D.; Pflueger, D.; Palermo, T.; Brown, D. |work=Forbes |da * '''security mechanisms''': Access restrictions are important to meeting regulatory and
    12 KB (1,614 words) - 17:07, 27 December 2023
  • ...tronic case report forms as well as the capture and management of clinical data. ...o the software's data capture, study design and management, usability, and security features.<ref name="OC20">{{cite web |url=https://community.openclinica.com
    9 KB (1,021 words) - 20:33, 19 September 2021
  • ...60px|right|Health informatics helps manage, analyze, and integrate patient data from physician to specialist and beyond.]] ..."collection, storage, retrieval, [and] communication ... of health-related data, [[information]], and knowledge."<ref name="Hovenga1">{{cite book |url=http
    37 KB (5,057 words) - 21:02, 6 January 2022
  • ...ls and graph the resulting data. It is generally used to graph time-series data of metrics such as CPU load and network bandwidth utilization.<ref name="Ab ...bandwidth statistics for their customers. It can be used to configure the data collection itself, allowing certain setups to be monitored without any manu
    7 KB (924 words) - 22:20, 17 September 2022
  • ..., limits of detection (LOD) and limits of quantitation (LOQ) determination data, LCQ report, documentation, and manager review, date, and signature. Any ch ...l that addresses quality control, GLP training, objectives for measurement data, traceability, instrument maintenance/calibration, auditing, corrective act
    54 KB (6,592 words) - 17:06, 27 December 2023
  • ...Michaud, Marion C.; Prelle, Myra Jean; Goethert, Joan B. |publisher=Noyes Data Corporation |year=1993 |pages=146 |isbn=9781437744934 |accessdate=17 Septem ...s must all be employed to ensure "the integrity and confidentiality of the data processed within the grid."<ref name="JacobIBMGrid">{{cite book |url=http:/
    12 KB (1,749 words) - 15:17, 20 September 2022
  • ...; assist state epidemiologists, other laboratories, and practitioners with data needs ...ich expanded from the CDC to the state labs, in addition to other homeland security efforts.<ref name="PHLJenkins" />
    20 KB (2,627 words) - 17:10, 29 June 2015
  • ...d) without interfering with the display and behavior of the existing page. Data can be retrieved using the XMLHttpRequest object and API (application progr .... JavaScript and the XMLHttpRequest object provide a method for exchanging data asynchronously between browser and server to avoid full page reloads.
    14 KB (2,087 words) - 17:03, 22 August 2014
  • ** 13. Instrument data capture and control ** 19. Agriculture and food data management
    16 KB (2,216 words) - 01:09, 28 March 2024
  • ...ion of "hardware and software in an effort to manage and manipulate health data and information."<ref name="CiampaHIT">{{cite book |url=https://books.googl ...project was started with the desire "to drive down the costs of exchanging data [and] to set the healthcare information free so that people can solve real
    27 KB (3,655 words) - 15:28, 20 September 2022
  • * encoding data; * providing integrated and modular security.
    5 KB (787 words) - 17:03, 22 August 2014

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)