Our Processes
The principal document of the System is the Allied Codification Publication No 1 (ACodP-1), also known as the NATO Manual on Codification, which describes the system operating procedures. In its military application the System has been accepted under two NATO Standardisation Agreements (STANAGs) - STANAG 3150 (Uniform System of Supply Classification) and STANAG 3151 (Uniform System of Item of Supply Identification). The System, which is based upon the United States Federal Catalogue System, is also used by the Civil Departments of some NATO nations. It is governed by the NATO Group of National Directors on Codification (AC/135) and implemented by the National Codification Bureau (NCB) of each user nation.
First level Processes
- ADMINISTRATION
Performs tasks relevant to table updates according to ACodP-1 and the system support files (H2-, H6- file and MRD) including the maintenance of all system and organisational tables (e.g. user profile, passwords, etc.).
- CODIFICATION
The functionality range of N-CORE contains all the procedures and features developed during our 16 plus years of practical codification experience: using and developing codification software. These functions make codification simpler and cost efficient. These proven and continuously improved processes will enhance your quality by reducing and eliminating input and output errors.
- INFORMATION
Performs database search tasks.
- NCAGE
Creation and Maintenance of national NCAGE Information.
- TOTAL ITEM RECORD (TIR)
Performs all tasks relevant to the a nation's TIR. This includes the automated generation and sending of L- and K-DICs for online NSN Registered User changes. Maintenance transactions (K-DICs) received from the NSPA will also be automatically updated in the TIR.
- CYBER SECURITY
Due to the rapid spread of cybercrime in recent years, information and IT security have become a challenge of the highest priority for companies and public authorities worldwide. Take advantage of our extensive services to be well prepared against cyber threats e.g. VPN (Virtual Private Network), Grid Card and Public Key Infrastructure (PKI) Technologies