Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 2029 - 2040 of 9886
Notice of Intent

Information technology - Keyboard layouts for...

Within the general scope described in ISO/IEC 9995-1, this part of ISO/IEC 9995 specifies symbols for functions found on any type of numeric, alphanumeric or composite keyboards. Each of these symbols is intended to be...
Notice of Intent

Information Technology - Small Computer System...

This part of ISO/IEC 14776 defines the mechanical, electrical, timing, and protocol requirements of the SCSI parallel interface to allow conforming SCSI devices to inter-operate. The SCSI parallel interface is a local I/O bus...
Notice of Intent

Information technology - Automatic identification...

This International Standard defines the requirements for the symbology known as QR Code. It specifies the QR Code symbology characteristics, data character encoding methods, symbol formats, dimensional characteristics, error...
Notice of Intent

Information technology - Automatic identification...

This International Standard specifies the requirements and test methods for physical and related attributes of a bar code master. It covers all forms of bar code master, irrespective of the mode of origination of the initial...
Notice of Intent

Information technology - Language independent...

This part of ISO/IEC 10967 specifies properties of many of the integer and floating point datatypes available in a variety of programming languages in common use for mathematical and numerical applications. It is not the...
Notice of Intent

Information technology - Language independent...

This part of ISO/IEC 10967 specifies properties of many of the integer and floating point datatypes available in a variety of programming languages in common use for mathematical and numerical applications. It is not the...
Notice of Intent

Information technology - Security techniques - ...

Scope This part of ISO/IEC 11770 defines key management mechanisms based on asymmetric cryptographic techniques. It specifically addresses the use of asymmetric techniques to achieve the following goals. 1) Establish a shared...