ACCESS NETWORK Sample Clauses

ACCESS NETWORK. The telecommunications network implemented according to the criteria in the appropriate TECHNICAL SPECIFICATIONS, which allows the end user to access the public telecommunications services and access to intranet of the AWARDED PROJECT, using the TRANSPORTATION NETWORK.
AutoNDA by SimpleDocs
ACCESS NETWORK. The Access Network is a network component which interconnects the demarcation point to a Rogers’ Primary Hub, providing last mile connectivity where Optical Wavelength Services demarcation point is not a Rogers Network Access Point. The Access Network could include media convertors, inter- building riser fibre, patch cabling, or dark fibre. Rogers’ Access Network fibre is compliant to ITU G.652 specifications. The preferred Access Network for service delivery is over Rogers’ owned fibre infrastructure and is described as ON-NET. Services delivered into OFF-NET buildings may be sub-contracted to a third party carrier.
ACCESS NETWORK. XXXXX will pay the whole of the FUNDING AWARDED by disbursements to be paid directly to the CONTRACTOR, according to the provisions of this Clause. 14.1.1. A first payment comprising of: • 20% FINANCING FOR THE ACCESS NETWORK, amounting to……………… The first disbursement is made against delivery of the ADVANCE PAYMENT GUARANTEE for the total amount thereof.
ACCESS NETWORK. In advance of 20% of the value of the FINANCING FOR THE ACCESS NETWORK (20%), amounting to THIRTEEN MILLION FOUR HUNDRED FIFTY THREE THOUSAND TWO HUNDRED FIVE US dollars and FORTY CENTS (US$ 13´453,205.40) payment which will be made at subscription of the FINANCING CONTRACT. This advance disbursement is made ​​against delivery of the ADVANCE PAYMENT GUARANTEE for the total amount thereof. A second disbursement of fifteen percent (15%) of the value of the FUNDING FOR ACCESS NETWORK amounting to TEN MILLION EIGHTY NINE THOUSAND NINE HUNDRED FOUR US DOLLARS AND FIVE CENTS (US$ 10´089,904.05) value that shall be paid when THE CONTRACTOR attests the installation of Sixty Percent (60%) of total COMPULSORY PAID INSTITUTIONS.
ACCESS NETWORK. In order to develop and promote access programming for the system, Franchisee hereby agrees to provide the following:
ACCESS NETWORK. 14.1.1 The scheme of disbursements of the value of the FINANCING OF THE ACCESS NETWORK is described in the following table: 1. Nods implementation. Civil work of the culminated Nodes including finishes, doors, concertina, cameras, sensors, racks, cabinets, technical floor, ladders, SPAT, tower. 7.5% Upon completion of 25% of the Nodes. It is specified that it does not include the implementation of cameras and sensors in these Nodes - Design of the ACCESS NETWORK indicating the number of Nodes, topology and equipment previously approved by the FITEL. - List, sent by THE CONTRACTOR, of the constructed Nodes, as well as the technical characteristics of the towers and shelters, in case of the poles indicate the descriptive memories and the calculations that allow to verify the fulfillment of the required technical characteristics.
ACCESS NETWORK. 14.1.1 An advance of 35% of the value of the FINANCING FOR THE ACCESS NETWORK (35%), amounting to twenty six million twenty three thousand eight hundred United States dollars (US$ 26´623,800.00) payment which will be made at subscription of the FINANCING CONTRACT. This advance disbursement is made after the Financing contract is subscribed and the warranty of the advanced payment of the total.
AutoNDA by SimpleDocs
ACCESS NETWORK. The IP Access network is LMA (Last Mile Access) to the customer and is the connection(s) that connect(s) the IP network to the customer. The customer generally has only one access connection to the IP network. If higher security against fibre breakdown etc. is requested, alternative routing can be purchased (redundancy) and it is possible to change to the Advanced product profile. If a full redundancy is requested, the alternative routed line must be of the same size and type as the primary routing.
ACCESS NETWORKThe system for delivering Access programming to Subscribers of Access Affiliates.

Related to ACCESS NETWORK

  • Network Access During its performance of this Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks;

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • System and Data Access Services a. System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • NON-NETWORK PROVIDER is a provider that has not entered into a contract with us or any other Blue Cross and Blue Shield plan. For pediatric dental care services, non-network provider is a dentist that has not entered into a contract with us or does not participate in the Dental Coast to Coast Network. For pediatric vision hardware services, a non-network provider is a provider that has not entered into a contract with EyeMed, our vision care service manager.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • System Upgrade Facilities and System Deliverability Upgrades Connecting Transmission Owner shall design, procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Appendix A hereto. The responsibility of the Developer for costs related to System Upgrade Facilities and System Deliverability Upgrades shall be determined in accordance with the provisions of Attachment S to the ISO OATT.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!