Information technology - Telecommunications and information exchange between systems - Services for ...
ISO/IEC 18051:2010 specifies the Services and Event Reports for Computer-Supported Telecommunications Applications, Phase III (CSTA).
ISO/IEC 18051:2010 is focused on providing application service interfaces to a Switching Function, Computing Function and a Special Resource Function. A CSTA application interface is disassociated from the various user-network interfaces and network-network…
Environmental monitoring programs at Class I nuclear facilities and uranium mines and mills
Scope
1.1 Facilities
1.1.1 Types of facilities
1.1.1.1
This Standard addresses the design and operation of EMPs for Class I nuclear facilities and uranium mines and mills. These facilities include
(a) nuclear reactors;
(b) uranium mines, mills, refineries, and conversion plants;
(c) uranium fuel fabrication plants;
(d) isotope-processing facilities;
(e) particle accelerators; and…
Selection and use of rigid sterilization containers
1 Scope
1.1
This Standard defines essential elements for the selection, use, and maintenance of rigid sterilization
containers. The selection criteria include minimum construction and performance requirements to help
health care facilities choose products that are appropriate for their intended use.
1.2
This Standard applies to the following types of rigid sterilization containers:
(a)…
ISO/IEC 11989:2010(E) specifies an Application Programming Interface (API) that provides interfaces to discover and manage iSCSI resources on a system. This International Standard is applicable to vendors who deliver drivers that provide iSCSI resources to a system.
Scope
1.1
This Standard specifies requirements for
(a) establishing and maintaining a confined space management program in accordance with OHSMS
principles;
(b) the roles and responsibilities of the management representative, entry team, and emergency
response team;
(c) management of external service providers;
(d) identification and designation of confined spaces;
(e) design and engineering of…
ISO/IEC 11989:2010(E) specifies an Application Programming Interface (API) that provides interfaces to discover and manage iSCSI resources on a system. This International Standard is applicable to vendors who deliver drivers that provide iSCSI resources to a system.
Information technology — Real-time locating systems (RTLS) — Part 5: Chirp spread spectrum (CSS) at ...
ISO/IEC 24730 defines air interface protocols and an application programming interface (API) for real-time locating systems (RTLS). ISO/IEC 24730-5:2010 defines an air interface protocol which utilizes chirp spread spectrum (CSS) at frequencies from 2,4 GHz to 2,483 GHz. This protocol supports bidirectional communication and two-way ranging between the readers and tags of an RTLS. The mandatory…
Information technology - Real-time locating systems (RTLS) - Part 5: Chirp spread spectrum (CSS) at ...
ISO/IEC 24730 defines air interface protocols and an application programming interface (API) for real-time locating systems (RTLS). ISO/IEC 24730-5:2010 defines an air interface protocol which utilizes chirp spread spectrum (CSS) at frequencies from 2,4 GHz to 2,483 GHz. This protocol supports bidirectional communication and two-way ranging between the readers and tags of an RTLS. The mandatory…
Scope
1.1
This Standard provides management requirements for facilities that collect, process, store, and use human blood and blood components for transfusion. It addresses issues of safety, efficacy, and quality for recipients, safety of donors, management of blood and blood components, and safety of facility personnel and others who are exposed to or potentially affected by blood and blood…
Information technology — Security techniques — Network security — Part 1: Overview and concepts
ISO/IEC 27033-1:2009 provides an overview of network security and related definitions. It defines and describes the concepts associated with, and provides management guidance on, network security. (Network security applies to the security of devices, security of management activities related to the devices, applications/services and end-users, in addition to security of the information being…