IT in general

Available (1690)

Showing 1621 - 1632 per page



Media access Independent Services (MIS)

The IEEE 802.21 Working Group on Media access Independent Services (MIS) developed standards that enabled optimization of higher layer services including IoT and handover services when performed between heterogeneous IEEE 802 networks. The MIS framework is also applicable when networking between IEEE 802 networks and Cellular networks.

IEEE 802.21

series on Next Generation Service Overlay Networks

A framework of Internet Protocol (IP)-based service overlay networks is described and context-aware [e.g., such as required Quality of Service (QoS) level; type of service such as real time versus data; nature of data stream such as I-frame versus B-frame; and type of terminal such as TV monitor versus personal digital assistant], dynamically adaptive (e.g., using locally derived information to discover, organize, and maintain traffic flows in the network within a local area network), and self-organizing networking capabilities (e.g., developing network structures based on the needs of the customers and the capabilities of existing network structures), including advanced routing and forwarding schemes, that are independent of underlying networks, are specified in this Next Generation Service Overlay Network (NGSON) standard. The NGSON architecture provides advanced service- and transport-related functions to support context-aware, dynamically adaptive, and self-organizing networks. This standard specifies a functional architecture for NGSON. The functional architecture consists of a set of functional entities (FEs), their functions, reference points, and information flows to illustrate service interaction and media delivery among FEs and external components. NGSON may operate with different underlying networks such as IP Multimedia Subsystem (IMS), next generation network (NGN), peer-to-peer (P2P) overlay, or Web to transmit NGSON signaling messages and/or media among its users and services.

IEEE 1903

Access Networks Working Group

The IEEE 1904 Access Networks Working Group (ANWG) uses an open and accredited process to develop standards for access networks. The Working Group technical expertise covers various optical access architectures based on Ethernet Passive Optical Networks (EPON), such as fiber-to-the-home, fiber-to-the-business, and cellular backhaul.

IEEE 1904

series on HDBaseT

The HDBaseT standard defines a protocol for communicating 5Play over a single long distance Local Area Network (LAN) cable. Building on the adopted HDBaseT specifications 1 and 2, this standard further enhances HDBaseT 5Play by broadening the variety of cables that the protocol can transfer over, expanding wireless compatibility, increasing power throughput over the HDBaseT link, harmonizing with Internet Protocol (IP), and adding security features.

IEEE 1911

Darwin Information Typing Architecture(DITA) Version 1.3

The Darwin Information Typing Architecture (DITA) is an XML-based architecture for authoring, producing, anddelivering topic-oriented, information-typed content that can be reused and single-sourced in a variety of ways.While DITA historically has been driven by the requirements of large-scale technical documentation authoring,management, and delivery, it is a standard that is applicable to any kind of publication or information that mightbe presented to readers, including interactive training and educational materials, standards, reports, businessdocuments, trade books, travel and nature guides, and more.DITA is designed for creating new document types and describing new information domains based on existingtypes and domains. The process for creating new types and domains is called specialization. Specializationenables the creation of specific, targeted XML grammars that can still use tools and design rules that weredeveloped for more general types and domains; this is similar to how classes in an object-oriented system caninherit the methods of ancestor classes.

Standard for Ethical considerations in Emulated Empathy in Autonomous and Intelligent Systems

This standard defines a model for ethical considerations and practices in the design, creation and use of empathic technology, incorporating systems that have the capacity to identify, quantify, respond to, or simulate affective states, such as emotions and cognitive states. This includes coverage of 'affective computing', 'emotion Artificial Intelligence' and related fields.
IEEE P7014

OASIS Open Command and Control

The OpenC2 TC was chartered to draft documents, specifications, lexicons or other artifacts to fulfill the needs of cyber security command and control in a standardized manner. The Technical Committee will leverage pre-existing standards to the greatest extent practical, identifying gaps pertaining to the command and control of technologies that provide or support cyber defenses. The TC will base its initial efforts on artifacts generated by the OpenC2 Forum, a community of cyber-security stakeholders that was facilitated by the National Security Agency; the Forum has published a language description document (RC4), actuator profiles, and open source prototype implementations.

For more information on the OpenC2 TC, see the TC Charter.

OpenC2 TC standing rules can be found under Additional Information.

OpenC2 TC

OASIS Collaborative Automated Course of Action Operations (CACAO) for Cyber Security TC

CACAO TC members are developing a standard to implement the course of action playbook model for cybersecurity operations.

In order to defend against cyber threats, organizations must manually identify, create, and document the prevention, mitigation, and remediation steps that, together, form a course of action playbook. However, today, there is is no standardized way to document and share these playbooks across organizational boundaries and technology solutions.

CACAO addresses this problem by defining a sequence of cyber defense actions that can be executed for each type of playbook. It will specifically enable organizations to:

  1. create course of action playbooks in a structured machine-readable format,
  2. digitally sign course of action playbooks,
  3. securely share course of action playbooks across organizational boundaries and technological solutions, and
  4. document processing instructions for course of action playbooks in a machine readable format.

For more information, see the CACAO TC Charter.

CACAO TC

OASIS Static Analysis Results Interchange Format (SARIF) TC

SARIF TC members are developing an interoperability standard for detecting software defects and vulnerabilities. The goal is to define a common output format for static analysis tools that will make it feasible for developers and teams to view, understand, interact with, and manage the results produced by all their tools.

SARIF represents a leap forward in the usability of static analysis tools. Many organizations in the safety and security communities use several competing tools on their code. SARIF will allow them to combine and compare the results more easily to gain a sharper picture of the issues in their code that need to be addressed. Engineering teams will be able to easily access a broad range of potential defects and vulnerabilities in compliance with privacy and accessibility standards. SARIF will support the development of products whose code spans languages and operating systems.

For more information, see the SARIF TC Charter.

SARIF TC

Akoma Ntoso Version 1.0

The Akoma Ntoso standard distinguishes between concepts regarding the description and identification of legal documents, their content, and the context in which they areused.  Names are used to associate the document representations to concepts so that documents can be “read/understood” by a machine, thus allowing sophisticated services that are impossible to attain with documents containing only typographical information, such as documents created in word-processing applications.To make documents machine-readable, every part with a relevant meaning and role must have a “name” (or “tag”) that machines can read. The content is marked up as precisely as possible according to the legal analysis of the text. This requires precisely identifying the boundaries of the different text segments, providing an element name that best describes the text in each situation, and also providing a correct identifier to each labelled fragment.

Akoma Ntoso Naming Convention Version 1.0

The Akoma Ntoso standard defines a number of referenceable concepts that are used in many situations in the lifecycle of legal documents. The purpose of this section is to provide: a standard referencing mechanism to these concepts through the use of IRI references associated to classes and instances of an ad hoc ontology (the Akoma Notoso Naming Convention). The referencing mechanism is meant to be generic and evolving with the evolution of the underlying ontology; a set of requirements for other naming conventions to be usable within Akoma Ntoso XML resources in a proper way.