Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8533 - 8544 of 8917
Notice of Intent

User guide for steel storage racks

Note: This NOI was withdrawn by the responsible SDO on February 10, 2022. This guide applies primarily to selective pallet racks, although the principles may be used when purchasing and using other types of racks, such as...
Notice of Intent

Natural gas for vehicles installation code

This Code applies to the installation, inspection, repair, and maintenance of the fuel storage and delivery system installed in on-road vehicles for use with compressed natural gas (CNG) and liquefied natural gas (LNG). This...
Notice of Intent

Protective equipment for use in ice hockey - ...

This document specifies performance requirements and test methods for neck laceration protectors used in ice hockey. Neck laceration protectors are needed to reduce the risk of direct laceration to the neck caused by contact...
Notice of Intent

Systems and software engineering - Software life...

1.1 Overview This document establishes a common framework for software life cycle processes, with well-defined terminology, that can be referenced by the software industry. It contains processes, activities, and tasks that...
Notice of Intent

Canadian Hydrogen Installation Code

PURPOSE AND SCOPE. --- Establishment of the installation requirements for hydrogen generating equipment, hydrogen utilizing equipment, hydrogen dispensing equipment, hydrogen storage containers, hydrogen piping systems and...
Notice of Intent

Canadian Hydrogen Installation Code

The purpose of this code is to establish the installation requirements for hydrogen generating equip-ment, hydrogen utilization equipment, hydrogen dispensing equipment, hydrogen storage contain-ers, hydrogen piping systems...
Notice of Intent

Amendment 1 - Information technology - Security...

ISO/IEC 10118 (all parts) specifies hash-functions and is therefore applicable to the provision of authentication, integrity and non-repudiation services. Hash-functions map strings of bits of variable (but usually upper...
Notice of Intent

Amendment 2 - Information technology - Security...

This document defines key establishment mechanisms based on weak secrets, i.e. secrets that can be readily memorized by a human, and hence, secrets that will be chosen from a relatively small set of possibilities. It...