Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8665 - 8676 of 8785
Notice of Intent

Information technology - Business operational...

This document: provides method(s) for identifying, in Open-edi modelling technologies and development of scenarios, the additional requirements in business operational view (BOV) specifications for identifying the additional...
Notice of Intent

Software, systems and enterprise - Architecture...

This document specifies the means to organize and record architecture evaluations for enterprise, systems and software fields of application. The aim of this document is to enable architecture evaluations that are used to: a)...
Notice of Intent

Information technology - Use of biometrics in...

The ISO 30137 series is applicable to the use of biometrics in VSS (also known as Closed Circuit Television or CCTV systems) for a number of scenarios, including real-time operation against watchlists post event analysis of...
Notice of Intent

Systems and software engineering - System of ...

1.1 Purpose This document provides a set of critical system of systems (SoS) considerations to be addressed at key points in the life cycle of the system of interest (SoI). This document refers to considerations that apply to...
Notice of Intent

Systems and software engineering - Lifecycle ...

This document provides management and engineering guide to the intermediate profile described in terms of business management, project management, software implementation and acquisition processes. This document is applicable...
Notice of Intent

Fuel cell technologies - Part 5-100: Portable...

This part of IEC 62282 covers construction, marking and test requirements for portable fuel cell power systems. These fuel cell systems are movable and not fastened or otherwise secured to a specific location. The purpose of...
Notice of Intent

Information security, cybersecurity and privacy...

This document provides packages of security assurance and security functional requirements that have been identified as useful in support of common usage by stakeholders. EXAMPLE Examples of provided packages include the...