Guides

data storage

Data Storage

Learn the essentials of data storage and how data storage technology is available to meet nearly…

Read More

good clinical practice

Good Clinical Practice

See how Good Clinical Practice guides studies to ensure that the highest quality data is…

Read More

electronic consent

Electronic Consent: Definition and How It Works

Learn about electronic consent, considered safe and effective in protecting subjects’ rights in…

Read More

gxp

GxP

See how understanding, implementing, and maintaining GxP standards is an effective way to provide…

Read More

good laboratory practice

Good Laboratory Practice (GLP)

See how GLP principles and fundamental requirements provide the foundation for laboratories to…

Read More

data manipulation

18 Data Manipulation Tips

Data manipulation changes the presentation and organization of data. Get data manipulation tips…

Read More

data reporting

Data Reporting

See how to develop and follow proven processes, use accurate raw data, and leverage software…

Read More

credential stuffing

Credential Stuffing

Learn about credential stuffing, a type of multi-layer cyberattack that “stuffs” stolen usernames…

Read More

ecoa clinical trials

What Is eCOA? Improving Clinical Trial Data…

Learn about eCOA and how it improves clinical data quality, with benefits that include generating…

Read More

ecrf

What Is an eCRF?

Learn what an eCRF is and see how the transition to eCRFs is driven by the time they save and the…

Read More

electronic laboratory notebook

How to Select an Electronic Laboratory Notebook

See how electronic laboratory notebooks can provide a strategic and competitive edge by up-…

Read More

etmf

What Is an eTMF?

See how the improvements and cost savings in the lifecycle of a clinical trial far outweigh the…

Read More

ransomware protection

Ransomware Protection

See why ransomware protection must take into account all components of an organization’s IT…

Read More

cryptojacking

What Is Cryptojacking? Prevention, Detection,…

The threat of cryptojacking extends from petty thieves to global crime syndicates; read this…

Read More