Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 2101 - 2112 of 6119
Notice of Intent

Information Technology - Syntactic Metalanguage...

This International Standard defines a notation, Extended BNF, for specifying the syntax of a linear sequence of symbols. It defines both the logical structure of the notation and its graphical representation. Extended BNF has...
Notice of Intent

Information Technology - Telecommunications and...

This International Standard specifies the supplementary services Calling Name Identification Presentation (SS-CNIP), Connected Name Identification Presentation (SS-CONP) and Calling/Connected Name Identification Restriction...
Notice of Intent

Information technology - Electronic discovery...

This document provides guidance for technical and non-technical personnel at senior management levels within an organization, including those with responsibility for compliance with statuary and regulatory requirements, and...
Notice of Intent

CHILL - The ITU-T Programming Language

This Recommendation | International Standard defines the ITU-T programming language CHILL. When CHILL was first defined in 1980 CHILL stood for CCITT High Level Language. The following subclauses of this clause introduce some...
Notice of Intent

Secondary lithium-ion cells for the propulsion...

This part of IEC 62660 specifies test procedures and the acceptance criteria for safety performance of secondary lithium-ion cells and cell blocks used for the propulsion of electric vehicles (EV) including battery electric...
Notice of Intent

Live working - Protective clothing against the...

This standard is applicable to protective clothing used in work where there is the risk of exposure to an electric arc hazard. This international standard specifies requirements and test methods applicable to materials and...
Notice of Intent

IT Security techniques - Key management - Part...

This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key...