Information technology — JPEG 2000 image coding system — Part 9: Interactivity tools, APIs and proto...
This Document defines, in an extensible manner, syntaxes and methods for the remote interrogation and optional modification of JPEG 2000 codestreams and files in accordance with their definition in Rec. ITU-T T.800 | ISO/IEC 15444-1 and other members of the Rec. ITU-T T.8xx | ISO/IEC 15444-x family of Recommendations | Standards.
In this document, the defined syntaxes and methods are referred to…
Information technology - JPEG 2000 image coding system - Part 9: Interactivity tools, APIs and proto...
This Document defines, in an extensible manner, syntaxes and methods for the remote interrogation and optional modification of JPEG 2000 codestreams and files in accordance with their definition in Rec. ITU-T T.800 | ISO/IEC 15444-1 and other members of the Rec. ITU-T T.8xx | ISO/IEC 15444-x family of Recommendations | Standards.
In this document, the defined syntaxes and methods are referred to…
Purpose
This standard aims to enhance service excellence and continuous improvement in the quality of pediatric pain management. It offers organizational leaders and teams who provide care to infants, children, and adolescents (collectively defined as children) and their families, guidance on pediatric pain management practices, professional development, policy development, and quality…
Information technology — Governance of IT — Governance implications of the use of artificial intelli...
1 Scope
This document provides guidance for members of the governing body of an organization to enable and govern the use of Artificial Intelligence (AI), in order to ensure its effective, efficient and acceptable use within the organization.
This document also provides guidance to a wider community, including:
— executive managers;
— external businesses or technical specialists, such as…
Welding and allied processes — Vocabulary — Part 2: Health and safety
This document contains terms and definitions applicable to health and safety in welding and allied processes. It is intended to be referenced in other documents dealing with this subject.
In the main body of this document, terms are arranged in systematic order. Indexes are included at the end of this document in which all terms are listed alphabetically in English, French and German,…
Information technology — Governance of IT — Governance implications of the use of artificial intelli...
This document provides guidance for members of the governing body of an organization to enable and govern the use of Artificial Intelligence (AI), in order to ensure its effective, efficient and acceptable use within the organization.
This document also provides guidance to a wider community, including:
— executive managers;
— external businesses or technical specialists, such as legal or…
Information technology - Governance of IT - Governance implications of the use of artificial intelli...
This document provides guidance for members of the governing body of an organization to enable and govern the use of Artificial Intelligence (AI), in order to ensure its effective, efficient and acceptable use within the organization.
This document also provides guidance to a wider community, including:
— executive managers;
— external businesses or technical specialists, such as legal or…
Information technology — Governance of data — Part 3: Guidelines for data classification
This document provides essential guidance for members of governing bodies of organizations and management on the use of data classification as a means to support the organization’s overall data governance policy and associated systems. It sets out important factors to be considered in developing and deploying a data classification system.
Information technology - Governance of data - Part 3: Guidelines for data classification
This document provides essential guidance for members of governing bodies of organizations and management on the use of data classification as a means to support the organization’s overall data governance policy and associated systems. It sets out important factors to be considered in developing and deploying a data classification system.
Information technology — Security techniques — Anonymous digital signatures — Part 2: Mechanisms usi...
1 Scope
This part of ISO/IEC 20008 specifies anonymous digital signature mechanisms, in which a verifier
makes use of a group public key to verify a digital signature.
It provides
— a general description of an anonymous digital signature mechanism using a group public key, and
— a variety of mechanisms that provide such anonymous digital signatures.
For each mechanism, this part of ISO/IEC…