Search results
From LIMSWiki
Jump to navigationJump to search
- ...h sample entering and exiting the system is centrally stored, usually on a computer-based [[laboratory informatics]] system that can be backed up frequently. T ...ership of the physical samples and the information they contain. Icelandic law holds that the Icelandic government has custodial rights of the physical sa22 KB (2,973 words) - 19:44, 4 August 2014
- ...siness. Mason offers 81 undergraduate degrees, 124 graduate degrees, and a law degree at its Fairfax, Arlington, Prince William, and Loudoun County campus7 KB (832 words) - 23:14, 22 June 2021
- ...illegal drug production. Moreover, it significantly limits the ability of law enforcement agencies to trace drug seizures and link illegal producers to o ...rtunities for police investigations of narcotrafficking. One challenge for law-enforcement agencies is to trace evidence collected at crime scenes in orde47 KB (6,409 words) - 00:22, 3 July 2019
- ...Data18">{{cite book |title=Data Protection: A Practical Guide to UK and EU Law |author=Carey, P. |publisher=Oxford University Press |year=2018 |isbn=9780145 KB (5,857 words) - 16:49, 12 April 2021
- [[File:Calculator-385506 1280.jpg|right|400px]]In January 2020, law firm Woodruf Sawyer indicated that among its business clients, the percenta ...umentation what actually constitutes being in the cloud, stating that the "computer system" of an insured organization extends to third-party networks. However11 KB (1,510 words) - 20:13, 16 August 2023
- ...://www.abajournal.com/magazine/article/managing_cybersecurity_risk/ |title=Law firms must manage cybersecurity risks |author=Sobowale, J. |work=ABA Journa ...csrc.nist.gov/glossary/term/security_control |title=security control |work=Computer Security Resource Center |publisher=National Institute of Standards and Tec80 KB (11,501 words) - 22:54, 23 February 2024
- ...ng 88% of labs testing controlled and non-controlled substances secured by law enforcement operations using a LIMS<ref name="NFLISSurv19">{{cite web |url= ...|url=https://caliberpublicsafety.com/forensic-advantage/ |publisher=Harris Computer Systems |accessdate=13 June 2022}}</ref><ref>{{Cite web |date=2022 |title=C33 KB (4,494 words) - 17:42, 28 May 2024
- ...f><ref name="ChristiansenLABKA89">{{cite journal |title=LABKA. A real-time computer system for the clinical laboratory |journal=Scandinavian Journal of Clinica ...ous publication has described the first version of the LIS as "a real-time computer system for handling and transfer of data to and from the hospital laborator35 KB (4,853 words) - 20:29, 21 July 2020
- ...csrc.nist.gov/glossary/term/security_control |title=security control |work=Computer Security Resource Center - Glossary |publisher=National Institute of Standa ...urity and Privacy Controls for Information Systems and Organizations |work=Computer Security Resource Center |publisher=National Institute of Standards and Tec10 KB (1,368 words) - 15:17, 21 March 2023
- ...ico-regulatory framework |journal=The South African Journal of Bioethics & Law |author=Dhai, A. |volume=6 |issue=2 |pages=38–39 |year=2013 |doi=10.7196/ ...gical material tracking recommendations within the ISBER best practices, a computer-based inventory system should be in place to allow for the tracking and ann27 KB (3,940 words) - 23:01, 14 June 2023
- ...mother tongue of the end users. The dashboard runs locally on every user's computer, in order to prevent from security issues. The data is stored on the secure ...ng a quality enhancement project at our institution. According to national law, the performance of a project and the subsequent publishing of the results62 KB (9,012 words) - 23:13, 1 April 2024
- ...project of the Software Engineering Coordinating Commettee |publisher=IEEE Computer Society |place=Los Alamitos, Calif. |isbn=978-0-7695-1000-2}}</ref> ...ture, and detailed design are critical for software development within the law. A test is successful if it passes the acceptance criteria, defined through61 KB (8,330 words) - 16:39, 29 April 2024
- ...ces (12), biology (5), humanities (5), social and behavioral sciences (4), computer science, systems engineering and electrical engineering (2), and medicine ( ...es{{Efn|Biology (4), geo sciences (4), social and behavioral sciences (3), computer science, systems engineering and electrical engineering (1), and humanities74 KB (9,357 words) - 23:47, 29 April 2024
- ...of Electronics and Information Technology]: provides "quality assurance in computer education among the nation's non-formal institutes" ...rimental research on nucleic acids and proteins" and developing and using "computer programs for modeling of protein three-dimensional structures"37 KB (5,043 words) - 19:51, 7 June 2024
- ...s for registration, inspection, and proficiency testing as outlined in the law.<ref name="CDCTestCom" /> Waived laboratory staff, as previously mentioned, ...mes from a belief that the old ways are better; however, in most cases the computer can greatly aid in the prevention of errors.<ref name="Sinard06" />57 KB (8,504 words) - 18:55, 19 June 2024
- ...[Informatics (academic field)|informatics]], computer science, psychology, law, statistics, epidemiology, and microbiology.12 KB (1,721 words) - 21:58, 6 January 2022
- ...ause major problems if they became a hinge issue for any type of liability law suit. ..."background-color:white; padding-left:10px; padding-right:10px;"|Tools for computer generated patterns48 KB (6,304 words) - 16:17, 19 January 2016
- ...ssue of access is inseparable from the issue of security and traceability. Law support on the conditions of access of the data is unanimously required, as ...taff are at the center of the coordination of these activities, as well as computer scientists, database administrators and IT staff.<ref name="GrudzieńInfo1634 KB (4,646 words) - 19:53, 3 October 2017
- ...as tied for 12th best in the nation and, on the graduate level, ranks the law school tied for 56th best in the nation and the business school tied for 58 * [https://www.ecs.baylor.edu/ School of Engineering and Computer Science]3 KB (394 words) - 22:34, 20 June 2021
- ...tation-Guides |title=Access Control Policy and Implementation Guides |work=Computer Security Resource Center |publisher=National Institute of Standards and Tec24 KB (3,298 words) - 16:23, 21 March 2023