Search

Refine Results
Type
Program
Status
Country
Province
City
Accreditation Sub-Programs
Program Specialty Area
GLP Area of Expertise
Field of Testing
Fields of Compliance
Period range

From

To

Displaying 7033 - 7044 of 10860
Notice of Intent

AI Readiness Assessment for manufacturers

This standard describes a methodology for evaluating manufacturers' readiness for integrating artificial intelligence (AI) technology into their operations. It covers key areas for AI adoption in manufacturing, including...
Notice of Intent

Business process improvement for digital adoption...

The standard provides guidance for small to medium-sized manufacturers to understand how and where to commence digital adoption/transformation by assessing and optimizing their business processes. It assists manufacturers in...
Notice of Intent

Direct plug-in nightlights

1.1 This Standard applies to direct plug-in nightlights not exceeding 10 W input, for indoor use only, in non-hazardous locations and intended to be used in accordance with the Canadian Electrical Code, Part I, CSA C22.1, and...
Notice of Intent

Primary batteries — Part 1: General

This part of IEC 60086 is intended to standardize primary batteries with respect to dimensions, nomenclature, terminal configurations, markings, test methods, typical performance, safety and environmental aspects. As a...
Notice of Intent

Adaptation to climate change — Guidelines on ...

This document gives guidelines for assessing the risks related to the potential impacts of climate change. It describes how to understand vulnerability and how to develop and implement a sound risk assessment in the context...
Notice of Intent

IT Security techniques - Hash-functions - Part...

This document specifies dedicated hash-functions, i.e. specially designed hash-functions. The hash-functions in this document are based on the iterative use of a round-function. Distinct round-functions are specified, giving...
Notice of Intent

IT Security techniques - Key management - Part...

This document defines key establishment mechanisms using symmetric cryptographic techniques. This document addresses three environments for the establishment of keys: Point-to-Point, Key Distribution Centre (KDC), and Key...
Notice of Intent

IT Security techniques - Digital signatures with...

This document specifies digital signature mechanisms with appendix whose security is based on the discrete logarithm problem. This document provides — a general description of a digital signature with appendix mechanism, and...
Notice of Intent

Information technology - Security techniques - ...

This part of ISO/IEC TR 15443 builds on the concepts presented in ISO/IEC TR 15443-1. It provides a discussion of the attributes of security assurance conformity assessment methods that contribute towards making assurance...