Oldest pages
From LIMSWiki
Jump to navigationJump to searchShowing below up to 50 results in range #2,501 to #2,550.
View (previous 50 | next 50) (20 | 50 | 100 | 250 | 500)
- Book:LIMS Selection Guide for ISO/IEC 17025 Laboratories/Conduct initial research into a specification document tailored to your lab's needs (22:48, 11 February 2023)
- Book:LIMS Selection Guide for ISO/IEC 17025 Laboratories (22:48, 11 February 2023)
- Book:LIMS Selection Guide for ISO/IEC 17025 Laboratories/Taking the next step/Conduct initial research into a specification document tailored to your lab's needs (22:49, 11 February 2023)
- Book:LIMS Selection Guide for ISO/IEC 17025 Laboratories/Taking the next step/Issue some of the specification as part of a request for information (RFI) (22:49, 11 February 2023)
- Book:LIMS Selection Guide for ISO/IEC 17025 Laboratories/Taking the next step/Respond to or open dialogue with vendors (22:50, 11 February 2023)
- Book:LIMS Selection Guide for ISO/IEC 17025 Laboratories/Closing remarks (22:54, 11 February 2023)
- Book:LIMS Selection Guide for ISO/IEC 17025 Laboratories/Taking the next step/LIMSpec in Microsoft Word format (22:55, 11 February 2023)
- Book:LIMS Selection Guide for ISO/IEC 17025 Laboratories/Resources for selecting and implementing informatics solutions/Consultants (22:57, 11 February 2023)
- Book:LIMS Selection Guide for ISO/IEC 17025 Laboratories/Resources for selecting and implementing informatics solutions/Other resources (22:57, 11 February 2023)
- Book:LIMS Selection Guide for ISO/IEC 17025 Laboratories/Taking the next step/Finalize the requirements specification and choose a vendor (22:57, 11 February 2023)
- Book:LIMS Selection Guide for ISO/IEC 17025 Laboratories/Introduction (23:01, 11 February 2023)
- Learning health systems (22:55, 21 February 2023)
- Journal:From months to minutes: Creating Hyperion, a novel data management system expediting data insights for oncology research and patient care (01:03, 22 February 2023)
- LII:Cybersecurity Fundamentals (20:34, 22 February 2023)
- LII:Cloud Computing for Enterprises (20:42, 22 February 2023)
- LII:Data Analysis: Statistical Modeling and Computation in Applications (20:49, 22 February 2023)
- LII:Machine Learning for Data Science and Analytics (21:27, 22 February 2023)
- Journal:Introductory evidence on data management and practice systems of forensic autopsies in sudden and unnatural deaths: A scoping review (23:13, 24 February 2023)
- Journal:Digitalization of calibration data management in the pharmaceutical industry using a multitenant platform (21:01, 1 March 2023)
- Journal:Bridging data management platforms and visualization tools to enable ad-hoc and smart analytics in life sciences (21:26, 13 March 2023)
- Journal:Understanding cybersecurity frameworks and information security standards: A review and comprehensive overview (17:15, 16 March 2023)
- LII:Health Informatics for Better and Safer Healthcare (22:05, 20 March 2023)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework (18:43, 21 March 2023)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it? (18:43, 21 March 2023)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What are the major regulations and standards dictating cybersecurity action? (18:44, 21 March 2023)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Fitting a cybersecurity standards framework into a cybersecurity plan (18:45, 21 March 2023)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan (18:45, 21 March 2023)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Closing remarks (18:45, 21 March 2023)
- LII:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec (18:46, 21 March 2023)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Assessment, authorization, and monitoring (18:50, 21 March 2023)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Program management (18:59, 21 March 2023)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Personally identifiable information processing and transparency (19:00, 21 March 2023)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/System and information integrity (19:00, 21 March 2023)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/A simplified description of NIST Special Publication 800-53 controls, with ties to LIMSpec/Supply chain risk management (19:01, 21 March 2023)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan (19:02, 21 March 2023)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What are the major regulations and standards dictating cybersecurity action?/Cybersecurity standards frameworks (19:11, 21 March 2023)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/What is a cybersecurity plan and why do you need it?/Cybersecurity planning and its value (19:11, 21 March 2023)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Fitting a cybersecurity standards framework into a cybersecurity plan/How do cybersecurity controls and frameworks guide plan development? (19:12, 21 March 2023)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/NIST Special Publication 800-53, Revision 5 and the NIST Cybersecurity Framework/NIST Cybersecurity Framework (19:13, 21 March 2023)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Develop and create the cybersecurity plan/Review progress (19:13, 21 March 2023)
- Book:Comprehensive Guide to Developing and Implementing a Cybersecurity Plan/Closing remarks/Recap and closing (19:14, 21 March 2023)
- Book:Introduction to Nuclear Medicine and Radiation Oncology (19:02, 28 March 2023)
- Journal:Integrative diagnostics: The time is now—a report from the International Society for Strategic Studies in Radiology (19:05, 11 April 2023)
- Data preservation (21:48, 21 April 2023)
- Journal:A critical literature review of historic scientific analog data: Uses, successes, and challenges (20:20, 25 April 2023)
- Data lake (02:01, 2 May 2023)
- Journal:An overview of data warehouse and data lake in modern enterprise data management (16:15, 3 May 2023)
- Manufacturing execution system (21:03, 3 May 2023)
- Journal:Identifying risk management challenges in laboratories (15:43, 16 May 2023)
- LII:LIMS Selection Guide for Manufacturing Quality Control (20:23, 16 May 2023)