Information technology - Learning, education and training - Conceptual Reference Model for Competenc...
ISO/IEC TR 24763:2011 provides a Conceptual Reference Model that comprises categories of items, attributes, and relationships. It can be used to identify the relationships between concepts represented within an information technology for learning, education and training (ITLET) system, such as competency, knowledge, skills, capabilities, qualifications, performance, and learning objectives. It…
Information technology — Radio frequency identification device performance test methods — Part 2: Te...
Radio frequency identification (RFID) technology has broad applicability to the automatic identification and data capture (AIDC) industry in item management. As a wireless communication technique based on radio frequency technology, the applications cover multiple levels of the industrial, commercial and retail supply chains. These can include
freight containers,
returnable transport items (RTI…
Information technology - Radio frequency identification device performance test methods - Part 2: Te...
Radio frequency identification (RFID) technology has broad applicability to the automatic identification and data capture (AIDC) industry in item management. As a wireless communication technique based on radio frequency technology, the applications cover multiple levels of the industrial, commercial and retail supply chains. These can include
freight containers,
returnable transport items (RTI…
Information technology — Automatic identification and data capture techniques — Air interface specif...
ISO/IEC 29143:2011 provides an air interface specification for Mobile radio frequency identification (RFID) interrogators being part of a passive backscatter system. This system comprises one or more mobile interrogators, also known as Mobile RFID interrogators, and an undefined number of tags, also known as labels.
Interrogators are not required to support channel sensing, i.e. do not need to…
Information technology - Automatic identification and data capture techniques - Air interface specif...
ISO/IEC 29143:2011 provides an air interface specification for Mobile radio frequency identification (RFID) interrogators being part of a passive backscatter system. This system comprises one or more mobile interrogators, also known as Mobile RFID interrogators, and an undefined number of tags, also known as labels.
Interrogators are not required to support channel sensing, i.e. do not need to…
Nuclear facilities — Criteria for the design and the operation of containment and ventilation system...
ISO 26802:2010 specifies the applicable requirements related to the design and the operation of containment and ventilation systems of nuclear power plants and research reactors taking into account the following.
For nuclear power plants, ISO 26802:2010 addresses only reactors that have a secondary confinement system based on IAEA recommendations.
For research reactors, ISO 26802:2010 applies…
Effective sterilization in health care facilities by the steam process
Scope
1.1
This Standard specifies essential elements in implementing a program for using steam to sterilize medical devices in health care facilities, with the object of achieving an adequate level of sterility assurance and minimizing the risk of injury to health care facility personnel and patients.
Notes:
(1) The term "health care facility" includes, but is not limited to, hospitals…
Effective sterilization in health care facilities by the ethylene oxide process
Scope
1.1
This Standard specifies essential elements in implementing a program for using ethylene oxide to sterilize medical devices in health care facilities, with the object of achieving an adequate level of sterility assurance and minimizing the risk of injury to health care facility personnel and patients.
Notes:
(1) The term "health care facility" includes, but is not limited to,…
Information technology - Security techniques - Entity authentication - Part 2: Mechanisms using symm...
ISO/IEC 9798-2:2008 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining…
Information technology — Security techniques — Entity authentication — Part 2: Mechanisms using symm...
ISO/IEC 9798-2:2008 specifies entity authentication mechanisms using symmetric encipherment algorithms. Four of the mechanisms provide entity authentication between two entities where no trusted third party is involved; two of these are mechanisms to unilaterally authenticate one entity to another, while the other two are mechanisms for mutual authentication of two entities. The remaining…