Search

Refine Results
Type
Program
Status
Country
Province
City
Program Specialty Area
Field of Testing
Period range

From

To

Displaying 157 - 168 of 168
Notice of Intent

Information technology - Database languages - ...

This part of ISO/IEC 9075 specifies the ability to invoke static methods written in the Java™ programming language as SQL-invoked routines and to use classes defined in the Java programming language as SQL structured user...
Notice of Intent

Information technology - Telecommunications and...

Based on the protocol defined in IEEE Std 1888™1, IEEE Standard for Ubiquitous Green Community Control Network Protocol, this standard extends component and data type definitions, message formats, and communication procedures...
Notice of Intent

Information technology - Telecommunications and...

1.1 Scope Based on the protocol defined in IEEE Std 1888™1, IEEE Standard for Ubiquitous Green Community Control Network Protocol, this standard extends component and data type definitions, message formats, and communication...
Notice of Intent

Information technology - Guidance for the use...

This document provides a tutorial of SQL routines and types using the Java™ programming language. This document discusses the following features of the SQL Language: The use of routines written in the Java programming...
Webpage

Diversity and inclusion

Canada’s climate is changing twice as fast as the global average, and it is affecting our built environment: the places we live and work. Our smallest communities to our largest cities need standardization to help address current and future challenges so...
Notice of Intent

Information technology - Database languages - ...

ISO/IEC 9075-2 specifies embedded SQL for the programming languages: Ada, C, COBOL, Fortran, MUMPS, Pascal, and PL/I. This part of ISO/IEC 9075 defines similar features of Database language SQL that support embedding of SQL...
Notice of Intent

Information technology - Telecommunications and...

The scope of this standard is to specify provision of connectionless user data confidentiality, frame data integrity, and data origin authenticity by media access independent protocols and entities that operate transparently...