GSO ISO/IEC 30100-3:2021

Gulf Standard   Current Edition
· Approved on 01 July 2021 ·

Information technology — Home network resource management — Part 3: Management application

Networking
Including local area networks (LAN), metropolitan area networks (MAN), wide area networks (WAN), etc.
IT applications in other fields
Including e-learning

GSO ISO/IEC 30100-3:2021 Files

GSO ISO/IEC 30100-3:2021 Scope

ISO/IEC 30100-3:2016(E) specifies a control and management interface for the integrated home network resources at the top of the interoperability framework specified by ISO/IEC 18012-1. Methods are specified for controlling and managing home network resources through a consistent interface regardless of the underlying home network middleware technologies.

Best Sellers From Information Sector

OS GSO ISO/TR 18492:2017
GSO ISO/TR 18492:2017 
Omani Standard
Long-term preservation of electronic document-based information
GSO ISO/TR 18492:2017
ISO/TR 18492:2005 
Gulf Standard
Long-term preservation of electronic document-based information
GSO ISO 16175-2:2013
ISO 16175-2:2011 
Gulf Standard
Information and documentation -- Principles and functional requirements for records in electronic office environments -- Part 2: Guidelines and functional requirements for digital records management systems
GSO ISO/TR 13028:2013
ISO/TR 13028:2010 
Gulf Standard
Information and documentation - Implementation guidelines for digitization of records

Recently Published from Information Sector

GSO ISO/TS 23635:2024
ISO/TS 23635:2022 
Gulf Standard
Blockchain and distributed ledger technologies — Guidelines for governance
GSO ISO/IEC TR 24372:2024
ISO/IEC TR 24372:2021 
Gulf Standard
Information technology — Artificial intelligence (AI) — Overview of computational approaches for AI systems
GSO ISO/IEC 30162:2024
ISO/IEC 30162:2022 
Gulf Standard
Internet of Things (IoT) — Compatibility requirements and model for devices within industrial IoT systems
GSO ISO/IEC 30107-3:2024
ISO/IEC 30107-3:2023 
Gulf Standard
Information technology — Biometric presentation attack detection — Part 3: Testing and reporting