Search results

From LIMSWiki
Jump to navigationJump to search
Results 21 – 41 of 131
Advanced search

Search in namespaces:

  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  
  • ...ts and services, representing virtual computing, networking, data storage, security management, container management, media management, and managed and profess 5. '''Where are your servers located, and how is data securely transferred to and from those servers?'''
    19 KB (2,666 words) - 22:56, 28 February 2024
  • ...ly managed in a pay-per-use model at the edge, in colocations, and in your data center."<ref name="HPEMeetHPEGreen">{{cite web |url=https://www.hpe.com/us/ ..., some of the questions from Chapter 5 (e.g., "How segregated is our cloud data from another customer's") are not relevant, as they are not providing publi
    16 KB (2,271 words) - 22:54, 28 February 2024
  • | name = BT Cyber Security Platform | services = Security management, advanced threat services, security monitoring, vulnerability management
    5 KB (604 words) - 22:51, 28 February 2024
  • | name = Wipro Managed Security Services ...ponse, DDoS mitigation, intrusion detection<br /> and prevention, endpoint security, firewall management
    5 KB (613 words) - 23:00, 28 February 2024
  • ...om Intel reviews the inner workings of Facebook's first built-from-scratch data center in 2013.]] ...e="GlanzData">{{cite web |url=http://www.nytimes.com/2012/09/23/technology/data-centers-waste-vast-amounts-of-energy-belying-industry-image.html |title=Pow
    31 KB (4,327 words) - 22:37, 27 August 2014
  • ...ers.<ref name="DellEMCCloud">{{cite web |url=https://www.dell.com/en-us/dt/data-protection/powerprotect-dd-series/cloud-tier.htm |title=Dell Cloud Tier |pu ..., some of the questions from Chapter 5 (e.g., "How segregated is our cloud data from another customer's") are not relevant, as they are not providing publi
    18 KB (2,498 words) - 22:52, 28 February 2024
  • ...ing technology, while the computing resources are consolidated at a remote data center location; in other cases, entire business applications have been cod ...ww.cnet.com/news/the-new-geek-chic-data-centers/ |title=The new geek chic: Data centers |author=Farber, D. |work=CNET |publisher=CBS Interactive |date=25 J
    40 KB (5,252 words) - 21:08, 19 September 2022
  • ...owards a risk catalog for data management plans|Towards a risk catalog for data management plans]]"''' ...nagement planning can be reduced. ('''[[Journal:Towards a risk catalog for data management plans|Full article...]]''')<br />
    46 KB (6,344 words) - 15:34, 2 January 2024
  • ...omputing, networking, content delivery, data storage, database management, security management, enterprise management, container management, developer support, 5. '''Where are your servers located, and how is data securely transferred to and from those servers?'''
    17 KB (2,270 words) - 17:31, 2 August 2023
  • ...thumb|400px|right|Laboratories around the world depend on a LIMS to manage data, assign rights, manage inventory, and more.]] ...low|workflow]] and data tracking support, flexible architecture, and smart data exchange interfaces, which fully "support its use in regulated environments
    50 KB (6,874 words) - 23:58, 11 April 2024
  • ...m/top-100-managed-security-service-providers-mssps/ |title=Top 100 Managed Security Service Providers (MSSPs) |work=Cyber Defense Magazine |publisher=Cyber Def ==Managed security services==
    5 KB (522 words) - 22:53, 28 February 2024
  • ...images|Personalized Oncology Suite: Integrating next-generation sequencing data and whole-slide bioimages]]"''' ...ournal:Personalized Oncology Suite: Integrating next-generation sequencing data and whole-slide bioimages|Full article...]]''')<br />
    84 KB (12,104 words) - 18:55, 12 April 2024
  • | name = Verizon Managed Security Services | homepage = {{URL|hhttps://www.verizon.com/business/products/security/}}
    5 KB (523 words) - 22:59, 28 February 2024
  • | name = Atos Managed Security Services | services = Managed detection and response, security operation center,<br />and CERT services
    4 KB (438 words) - 22:50, 28 February 2024
  • ...d identity management tool. This is important evaluate in terms of general security around the systems in scope. At the same time, the specific system may or m *Are cloud vendors evaluated for security and compliance with appropriate regulations?
    17 KB (2,440 words) - 16:58, 22 August 2014
  • ...ing/sequencing, [[proteomics]], specimen tracking, and observational study data management.<ref name="LK_Docs">{{cite web |url=https://www.labkey.org/Docum ...rotein database search functionality, comprehensive experiment annotation, data sharing, and several proteomic-friendly analytic tools.<ref>{{cite web |url
    25 KB (3,274 words) - 16:03, 29 March 2024
  • * Ensure adequate privacy and security #Protect electronic health information (privacy & security).
    17 KB (2,264 words) - 19:54, 19 September 2021
  • ...rs to document, store, retrieve, and share fully electronic [[laboratory]] data and information—usually research-based—"in ways that meet all legal, re ...e, manage, securely share, and permanently archive and retrieve all common data and records generated by research and development and testing labs."<ref na
    30 KB (4,184 words) - 22:49, 11 March 2024
  • ...rld depend on a laboratory information system to manage and report patient data and test results.]] ...and clinics) and their associated labs by managing and reporting critical data concerning "the status of infection, immunology, and care and treatment sta
    31 KB (4,113 words) - 22:15, 4 April 2024
  • ...ecause no data is saved to the user's device, chances are low any critical data can be retrieved and compromised if the device is lost. ('''[[Desktop virtu ...and clinics) and their associated labs by managing and reporting critical data concerning "the status of infection, immunology, and care and treatment sta
    55 KB (7,827 words) - 15:38, 2 January 2024

View (previous 20 | next 20) (20 | 50 | 100 | 250 | 500)