Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 8221 - 8232 of 8430
Notice of Intent

Identification cards - Recording technique - ...

ISO/IEC 7811 defines the characteristics for identification cards as defined in Clause 4 of this document and the use of such cards for international interchange. This document specifies requirements for a low coercivity...
Notice of Intent

Information technology - Multimedia application...

This document specifies four formats that are used by parties communicating using the Publish/Subscribe (PubSub) communication model for their multimedia communication purposes. The PubSub parties are: Publisher, Subscriber...
Notice of Intent

Systems and software engineering - Life cycle...

This document: — specifies the required processes implemented in the engineering activities that result in requirements for systems and software products (including services) throughout the life cycle; — provides guidelines...
Notice of Intent

Information technology — Generic cabling for ...

This part of ISO/IEC 11801, which is a Technical Report a) provides guidance on how to select and assess installed channels which conform to ISO/IEC 11801-1, and clarify if they also support ISO/IEC/IEEE 8802-3:2017/AMD3 for...
Notice of Intent

Ergonomics of human-system interaction - Part...

This part of ISO 9241 provides ergonomics guidance on individualization within interactive systems, including recommendations on ⎯ where individualization might be appropriate or inappropriate, and ⎯ how to apply...
Notice of Intent

Petroleum and Natural Gas Industries - Specific...

This part of ISO 19901 gives general requirements for the determination and use of meteorological and oceanographic (metocean) conditions for the design, construction and operation of offshore structures of all types used in...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent

afety Requirements for Electrical Equipment for...

This part of IEC 61010 applies to hand-held and hand-manipulated PROBE ASSEMBLIES of the types described below, and related accessories which are intended for professional, industrial process, and educational use. These PROBE...