Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 9769 - 9780 of 10579
Notice of Intent

Information technology - Storage management - ...

The Filesystems part of the Storage Management Technical Specification defines management profiles for Autonomous (top level) profiles for programs and devices whose central function is providing support and access to file...
Notice of Intent

Information technology - Storage management - ...

The host-base storage portion of the Storage Management Technical Specification defines management profiles for autonomous, component and abstract profiles for management of host-based storage devices. The autonomous profiles...
Notice of Intent

Organization and digitization of information ...

Note: The ICS code of this Notice of Intent (originally published on September 26, 2023) was updated by the responsible SDO on July 23, 2024. This document specifies the detailed process and criteria for decision makings when...
Notice of Intent

Canadian Hydrogen Installation Code

PURPOSE AND SCOPE. --- Establishment of the installation requirements for hydrogen generating equipment, hydrogen utilizing equipment, hydrogen dispensing equipment, hydrogen storage containers, hydrogen piping systems and...
Notice of Intent

Civil Engineering Works - Aggregates (all parts...

Part I Purpose and Scope The purpose of this part is to define terms related to aggregates used in civil engineering, to define the concept of granular class and to classify aggregates according to their intrinsic and...
Information technology - Security techniques - Key management - Part 2: Mechanisms using symmetric techniques
The purpose of key management is to provide procedures for handling cryptographic keying material to be used in symmetric or asymmetric cryptographic algorithms according to the security policy in force. This part of ISO/IEC...
Information technology - Security techniques - Key management - Part 3: Mechanisms using asymmetric techniques
This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...
Notice of Intent

Information Technology - Generic Digital Audio...

This part of ISO/IEC 16500 on .Contours: Technology Domain. describes the system functions and DAVIC tools relevant to the Contours defined in ISO/IEC TR 165001. A goal of this part of ISO/IEC 16500 is to guide implementers...
Notice of Intent

Information Technology - Generic Digital Audio...

This part of ISO/IEC 16500 provides a toolbox consisting of lower layer protocols and physical interfaces. Each tool is applicable at one or more of the reference points within the delivery system. The physical delivery media...