SPONSORED VIDEO
Play Video
1
FIPS 140-2
FIPS 140-2
::2014/08/28::
Play Video
2
Categorize your environment for an ATO (step 1 of 5)
Categorize your environment for an ATO (step 1 of 5)
::2013/06/06::
Play Video
3
FIPS county code
FIPS county code
::2014/11/17::
Play Video
4
Discover The Success Of FIPS
Discover The Success Of FIPS
::2015/02/28::
Play Video
5
Research In Motion Inches Up More Than 2% on FIPS Security Certification
Research In Motion Inches Up More Than 2% on FIPS Security Certification
::2010/12/01::
Play Video
6
DATA ENCRYPTION STANDARD (DES) netwinz
DATA ENCRYPTION STANDARD (DES) netwinz
::2011/06/17::
Play Video
7
Integral 64gb Crypto Dual Plus Fips 197 Encrypted
Integral 64gb Crypto Dual Plus Fips 197 Encrypted
::2015/01/29::
Play Video
8
Secure Hash Algorithm
Secure Hash Algorithm
::2014/10/27::
Play Video
9
News Update: Fortinet Security Earns U.S. Federal Certifications
News Update: Fortinet Security Earns U.S. Federal Certifications
::2010/09/13::
Play Video
10
SHA-2
SHA-2
::2014/08/26::
Play Video
11
Q&A ILMT 9.0 - Security
Q&A ILMT 9.0 - Security
::2014/12/04::
Play Video
12
SHA-1
SHA-1
::2014/07/15::
Play Video
13
Service Level Management  What you Need to Know For IT Operations Management
Service Level Management What you Need to Know For IT Operations Management
::2015/01/28::
Play Video
14
Cascade 9.6 -- Federal release -- "Built to last"
Cascade 9.6 -- Federal release -- "Built to last"
::2012/07/31::
Play Video
15
All About - SHA-1
All About - SHA-1
::2014/09/19::
Play Video
16
Federal Video Remote Interpreting (VRI)
Federal Video Remote Interpreting (VRI)
::2013/03/20::
Play Video
17
PIV Educational Video
PIV Educational Video
::2011/01/26::
Play Video
18
Data Encryption Standard
Data Encryption Standard
::2014/08/13::
Play Video
19
Riverbed Technical Leader Steve Riley Q&A on Data Protection
Riverbed Technical Leader Steve Riley Q&A on Data Protection
::2011/09/26::
Play Video
20
Novell ZENworks Full Disk Encryption - omówienie i pokaz rozwiązania do pełnego szyfrowania dysków
Novell ZENworks Full Disk Encryption - omówienie i pokaz rozwiązania do pełnego szyfrowania dysków
::2014/03/06::
Play Video
21
Technology Planning with Information Technology Solutions ITS
Technology Planning with Information Technology Solutions ITS
::2013/08/30::
Play Video
22
i-DENTITY : Unleash your mobile workforce !
i-DENTITY : Unleash your mobile workforce !
::2013/10/30::
Play Video
23
Integral Crypto Dual  - Encrypted USB Flash Drive
Integral Crypto Dual - Encrypted USB Flash Drive
::2011/03/21::
Play Video
24
aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197
aes tutorial, cryptography Advanced Encryption Standard AES Tutorial,fips 197
::2014/01/20::
Play Video
25
IDeePal for iPhone Demo - Best Password Manager - HD-320x480 WMV
IDeePal for iPhone Demo - Best Password Manager - HD-320x480 WMV
::2010/07/25::
Play Video
26
IDeePal 3.0 for iPad Demo - Best Password Manager - HD
IDeePal 3.0 for iPad Demo - Best Password Manager - HD
::2010/07/26::
Play Video
27
IDeePal 3.0 for iPhone Training Video Complete - Best Password Manager for iPhone iPad YT-HD
IDeePal 3.0 for iPhone Training Video Complete - Best Password Manager for iPhone iPad YT-HD
::2010/07/24::
Play Video
28
sha-1 tutorial ,how sha-1 works, fips 180,secure hash algorithm tutorial
sha-1 tutorial ,how sha-1 works, fips 180,secure hash algorithm tutorial
::2014/01/28::
Play Video
29
Canada citizenship double standard process-RQ- rahehal
Canada citizenship double standard process-RQ- rahehal
::2013/08/05::
Play Video
30
MEPS (Military Entrance Processing Station)
MEPS (Military Entrance Processing Station)
::2007/04/16::
Play Video
31
What is the processing time of a WES credential assessment report for FSWP?
What is the processing time of a WES credential assessment report for FSWP?
::2013/10/27::
Play Video
32
SSFS sets process automation standards in the finance industry
SSFS sets process automation standards in the finance industry
::2011/06/08::
Play Video
33
metallic mineral processing
metallic mineral processing
::2014/08/21::
Play Video
34
Configuring Mac OS X Workstations Using Windows Group Policy
Configuring Mac OS X Workstations Using Windows Group Policy
::2015/02/12::
Play Video
35
The Koyal Training Group: Insurance Fraud Investigator Training and Degree Program Information
The Koyal Training Group: Insurance Fraud Investigator Training and Degree Program Information
::2014/02/13::
Play Video
36
ACI Debate:  Payments Processing Standards, Regulation & Technology
ACI Debate: Payments Processing Standards, Regulation & Technology
::2011/09/21::
Play Video
37
low capacitymaize processing unit project report
low capacitymaize processing unit project report
::2013/10/16::
Play Video
38
action mining gold processing machine
action mining gold processing machine
::2014/04/24::
Play Video
39
standard operating procedure for conveyor belt
standard operating procedure for conveyor belt
::2013/12/31::
Play Video
40
Oracle Training - Accounts Payable in Oracle E-Business Suite R12 (1080p - HD)
Oracle Training - Accounts Payable in Oracle E-Business Suite R12 (1080p - HD)
::2010/08/11::
Play Video
41
Federal Skilled Trades Program in Canada
Federal Skilled Trades Program in Canada
::2013/12/13::
Play Video
42
Medical Payroll Processing Services
Medical Payroll Processing Services
::2014/01/28::
Play Video
43
Inside the FedEx Memphis "Super Hub"
Inside the FedEx Memphis "Super Hub"
::2010/12/08::
Play Video
44
"Wrong Choices, Wrong Time" - PSAC BC
"Wrong Choices, Wrong Time" - PSAC BC's reaction to the federal budget - March 29th.
::2012/03/30::
Play Video
45
Tax Forms & Deductions : Federal Income Tax Standard Deductions
Tax Forms & Deductions : Federal Income Tax Standard Deductions
::2009/04/03::
Play Video
46
Medical Coding Information | What is HIPAA?
Medical Coding Information | What is HIPAA?
::2014/09/29::
Play Video
47
Electronics Recycling at AERC Recycling Solutions
Electronics Recycling at AERC Recycling Solutions
::2011/06/14::
Play Video
48
conveyor vibrating feeders specs drawings information
conveyor vibrating feeders specs drawings information
::2013/10/17::
Play Video
49
HUD and FHFA  Exposed   (SOUND HAS BEEN ATTACKED)
HUD and FHFA Exposed (SOUND HAS BEEN ATTACKED)
::2013/12/06::
Play Video
50
Understanding Steam Sterilization
Understanding Steam Sterilization
::2014/04/07::
NEXT >>
RESULTS [ .. ]
From Wikipedia, the free encyclopedia
  (Redirected from FIPS place code)
Jump to: navigation, search

Federal Information Processing Standards (FIPS) are publicly announced standardizations developed by the United States federal government for compulsory use in computer systems by all non-military government agencies and by government contractors, when properly invoked and tailored on a contract.[1] The purpose of FIPS is key escrow,[2] and to ensure that all federal government and agencies adhere to the same guidelines regarding security and communication.

Many FIPS pronouncements are modified versions of standards used in the technical communities, such as the American National Standards Institute (ANSI), the Institute of Electrical and Electronics Engineers (IEEE), and the International Organization for Standardization (ISO).

Standard publications[edit]

The U.S. government developed many FIPS pronouncements to standardize codes: for instance, standards for encoding data (such as country codes), but more significantly some encryption standards, such as the Data Encryption Standard (FIPS 46-3[3]) and the Advanced Encryption Standard (FIPS 197[4])

In 1994 NOAA began broadcasting coded signals called FIPS (Federal Information Processing System) codes along with their standard weather-broadcasts from local stations. These codes identify the type of emergency and the specific geographic area, such as a county, affected by the emergency.

Withdrawal of geographic codes[edit]

Some examples of FIPS Codes for geographical areas include FIPS 10-4 for country codes or region codes and FIPS 5-2 for state codes. These codes were similar to or comparable with, but not the same as, ISO 3166, or the NUTS standard of the European Union. In 2002, the National Institute of Standards and Technology (NIST) withdrew several geographic FIPS code standards, including those for countries (FIPS 10-4), U.S. states (FIPS 5-2), and counties (FIPS 6-4).[5][6] These are to be replaced by ISO 3166 and INCITS standards 38 and 31, respectively.[7] Some of the codes maintain the previous numerical system, particularly for states.[8]

In 2008, NIST withdrew the FIPS 55-3 database.[5] This database included 5-digit numeric place codes for cities, towns, and villages, or other centers of population in the United States. The codes were assigned alphabetically to places within each state, and as a result changed frequently in order to maintain the alphabetical sorting. NIST replaced these codes with the more permanent GNIS Feature ID, maintained by the U.S. Board on Geographic Names. The GNIS database is the official geographic names repository database for the United States, and is designated the only source of geographic names and locative attributes for use by the agencies of the Federal Government.[9] FIPS 8-6 "Metropolitan Areas" and 9-1 "Congressional Districts of the U.S." were also withdrawn in 2008, to be replaced with INCITS standards 454 and 455, respectively.[7]

The U.S. Census Bureau used FIPS place codes database to identify legal and statistical entities for county subdivisions, places, and American Indian areas, Alaska Native areas, or Hawaiian home lands when they needed to present census data for these areas.[10] In response to the NIST decision, the Census Bureau is in the process of transitioning over to the GNIS Feature ID, which will be completed after the 2010 Census. Until then, previously issued FIPS place codes, renamed "Census Code," will continue to be used, with the Census bureau assigning new codes as needed for their internal use during the transition.[8][11]

See also[edit]

References[edit]

External links[edit]


Wikipedia content is licensed under the GFDL License
Powered by YouTube
MASHPEDIA
LEGAL
  • Mashpedia © 2015