Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 1177 - 1188 of 5717
Notice of Intent

Information technology — Learning, education ...

1.1 Scope of MLR multipart standard The primary purpose of this International Standard is to specify metadata elements and their attributes for the description of learning resources. This includes the rules governing the...
Notice of Intent

Hydrogen generators using water electrolysis - ...

The Standard is an adoption with U.S. and Canadian deviations of the identically titled ISO (International Organization of Standardization) standard ISO 22734. The standard applies to the construction, safety, and performance...
Notice of Intent

Medical electrical equipment - Part 1: General...

1.1 * Scope This International Standard applies to the BASIC SAFETY and ESSENTIAL PERFORMANCE of MEDICAL ELECTRICAL EQUIPMENT and MEDICAL ELECTRICAL SYSTEMS, hereafter referred to as ME EQUIPMENT and ME SYSTEMS. If a clause...
Information Technology - Open Systems Interconnection - Generic Upper Layers Security: Protecting Transfer Syntax Protocol Implementation Conformance Statement (PICS) Proforma
This Recommendation / International Standard defines a Protocol Implementation Conformance Statement (PICS) proforma for the detailed expression of the conformance requirements of ITU-T Rec. X.833 / ISO/IEC 11586-4 and Annex...
Notice of Intent

Information Technology - Telecommunications and...

This International Standard specifies the Transit Counter additional network feature (ANF-TC), which is applicable to various basic services supported by Private Integrated Services Networks (PISN). Basic services are...
Notice of Intent

Information technology - Programming languages...

This Technical Report specifies a series of extensions of the programming language C, specified by International Standard ISO/IEC 9899:1999. These extensions can be useful in the mitigation of security vulnerabilities in...