Application Log Stream Delete 1‌ Sample Clauses

Application Log Stream Delete 1‌. Description This object change notification announces the deletion of an application log stream. It also identifies the location of the application log stream’s associated log and configu- 5 ration files so they can be found and read. This notification alerts an administrator that the log file associated with this applica- tion log stream is no longer active and perhaps cleanup or archiving chores should commence. 10 40 1 NTF Attribute Name Attribute Type (NTF- Recommended Value) SA Forum-Recommended Value Event Type Mandatory SA_NTF_OBJECT_DELETION Notification Object Mandatory LDAP DN of the application log stream (as specified in Section 4.1) that has been cre- ated. Notification Class Identifier NTF-internal minorId = 0xca. Additional Text Optional “Application log stream <log stream name> deleted” Additional Informa- tion Optional Unspecified Source Indicator Mandatory SA_NTF_OBJECT_OPERATION Attribute List Optional [0].attributeId = SA_LOG_NTF_ATTR_LOG_STREAM_NAME [0].attributeType = SA_NTF_VALUE_STRING [0].attributeValue = <stream name> [1].attributeId = SA_LOG_NTF_ATTR_LOGFILE_NAME [1].attributeType = SA_NTF_VALUE_STRING [1].attributeValue = <logfile name> [2].attributeId = SA_LOG_NTF_ATTR_LOGFILE_PATH_NAME [2].attributeType = SA_NTF_VALUE_STRING [2].attributeValue = <pathname> Table 7 Application Log Stream Deletion Notification 5 15 20 30 35 40
AutoNDA by SimpleDocs

Related to Application Log Stream Delete 1‌

  • Exceptional Access to Thick Registration Data In case of a registrar failure, deaccreditation, court order, etc. that prompts the temporary or definitive transfer of its domain names to another registrar, at the request of ICANN, Registry Operator will provide ICANN with up-­‐to-­‐date data for the domain names of the losing registrar. The data will be provided in the format specified in Specification 2 for Data Escrow. The file will only contain data related to the domain names of the losing registrar. Registry Operator will provide the data as soon as commercially practicable, but in no event later than five (5) calendar days following ICANN’s request. Unless otherwise agreed by Registry Operator and ICANN, the file will be made available for download by ICANN in the same manner as the data specified in Section 3.1 of this Specification.

  • New Hampshire Specific Data Security Requirements The Provider agrees to the following privacy and security standards from “the Minimum Standards for Privacy and Security of Student and Employee Data” from the New Hampshire Department of Education. Specifically, the Provider agrees to:

  • Specific Provisions for Access Rights to Software For the avoidance of doubt, the general provisions for Access Rights provided for in this Section 9 are applicable also to Software. Parties’ Access Rights to Software do not include any right to receive source code or object code ported to a certain hardware platform or any right to receive respective Software documentation in any particular form or detail, but only as available from the Party granting the Access Rights.

  • CERTIFICATION REGARDING CERTAIN FOREIGN-OWNED COMPANIES IN CONNECTION WITH CRITICAL INFRASTRUCTURE (Texas law as of September 1, 2021) By submitting a proposal to this Solicitation, you certify that you agree to the following required by Texas law as of September 1, 2021: Proposing Company is prohibited from entering into a contract or other agreement relating to critical infrastructure that would grant to the company direct or remote access to or control of critical infrastructure in this state, excluding access specifically allowed by the Proposing Company for product warranty and support purposes. Company, certifies that neither it nor its parent company nor any affiliate of company or its parent company, is (1) owned by or the majority of stock or other ownership interest of the company is held or controlled by individuals who are citizens of China, Iran, North Korea, Russia, or a designated country; (2) a company or other entity, including governmental entity, that is owned or controlled by citizens of or is directly controlled by the government of China, Iran, North Korea, Russia, or a designated country; or (3) headquartered in China, Iran, North Korea, Russia, or a designated country. For purposes of this contract, “critical infrastructure” means “a communication infrastructure system, cybersecurity system, electric grid, hazardous waste treatment system, or water treatment facility.” See Tex. Gov’t Code § 2274.0101(2) of SB 1226 (87th leg.). The company verifies and certifies that company will not grant direct or remote access to or control of critical infrastructure, except for product warranty and support purposes, to prohibited individuals, companies, or entities, including governmental entities, owned, controlled, or headquartered in China, Iran, North Korea, Russia, or a designated country, as determined by the Governor.

  • Background and Narrative of Budget Reductions 2. Assumptions Used in the Deficit Reduction Plan: - EBF and Estimated New Tier Funding: - Equal Assessed Valuation and Tax Rates: - Employee Salaries and Benefits: - Short and Long Term Borrowing: - Educational Impact: - Other Assumptions: - Has the district considered shared services or outsourcing (Ex: Transportation, Insurance) If yes please explain: ESTIMATED LIMITATION OF ADMINISTRATIVE COSTS (School Districts Only) (For Local Use Only)

  • GMP Cost Limitation The Guaranteed Maximum Price shall not be in excess of the GMP Cost Limitation.

  • ECR Number Environmental Commitment Record Requirements Description of ADOT Responsibilities TMP-3 The following measures will be implemented for the Selected Alternative: • All equipment exhaust systems will be in good working order. Properly designed engine enclosures and intake silencers will be used. • Equipment will be maintained on a regular basis. New equipment will be subject to new product emission standards. • Stationary equipment will be located as far away from sensitive receivers as possible. • Construction-related noise generators will be shielded from noise receivers (e.g., use temporary enclosures to shield generators or crushers, take advantage of site conditions to provide topographic separation). • Construction alerts will be distributed to keep the public informed of construction activities, and a toll-free number for construction-related complaints will be provided. • During the design phase, hours of operation will be evaluated to minimize disruptions during construction. ADOT to oversee for compliance TMP-4 Congestion from construction-related traffic will create temporary impacts in the project vicinity. The magnitude of these impacts will vary depending on the location of the sources of the fill material and of the disposition sites for surplus material, the land uses along the routes, the duration of hauling operations, staging locations, and the construction phasing. To identify acceptable routes and times of operation, ADOT, or its representative, will prepare an agreement with local agencies regarding hauling of construction materials on public streets. ADOT to oversee for compliance TP Attachment 000-0 Xxxxx Xxxxxxxx Xxxxxxx Project Record of Decision (ROD) Developer’s Environmental Commitment Requirements The following table includes the Project-specific environmental commitments as written in the ROD, with minor modifications for clarification purposes. As it relates to these Technical Provisions, references to freeway, project, South Mountain Freeway, proposed action, proposed freeway, and Selected Alternative mean the Project, and references to contractor mean Developer. Developer shall comply with and perform all of the contractor and ADOT requirements, including the ADOT obligations, commitments, and responsibilities, identified in the following table, except to the extent of those requirements that are specifically identified in the third column, entitled “Description of ADOT Responsibilities,” which are not delegated to Developer.

  • Please see the current Washtenaw Community College catalog for up-to-date program requirements Secondary / Post-Secondary Program Alignment Welding HIGH SCHOOL COURSE SEQUENCE 9th Grade 10th Grade 11th Grade 12th Grade English 9 Algebra I World History/Geography Biology World Language Phys Ed/Health English 10 Geometry U.S. History/Geography Physics or Chemistry World Language Visual/Performing/Applied Arts English 11 Algebra II Civics/Economics Welding English 12 Math Credit Science Credit Welding WASHTENAW COMMUNITY COLLEGE Welding Associate in Applied Science Semester 1 Math Elective(s)* 3 WAF 105 Introduction to Welding Processes 2 WAF 111 Oxy-fuel Welding 4 WAF 112 Shielded Metal Arc Welding 4 Semester Total 13 Semester 2 Speech Elective(s) 3 WAF 106 Blueprint Reading for Welders 3 WAF 123 Advanced Oxy-fuel Welding 4 WAF 124 Advanced Shielded Metal Arc Welding 4 Semester Total 14 Semester 3 Arts/Human. Elective(s) 3 Computer Lit. Elective(s) 3 WAF 215 Advanced Gas Tungsten Arc Welding 4 WAF 288 Gas Metal Arc Welding 4 Semester Total 14 Semester 4 WAF 200 Layout Theory Welding 3 WAF 210 Welding Metallurgy 3 Soc. Sci. Elective(s) 3 WAF 226 Specialized Welding Procedures 4 Semester Total 13 Semester 5 Nat. Sci. Elective(s) 4 WAF 227 Basic Fabrication 3 WAF 229 Shape Cutting Operations 3 Writing Elective(s) 3 Semester Total 13 Program Totals 67

  • APPLICATION/SCOPE 1.1 This collective agreement shall be applicable to every person who requires a teacher certificate as a condition of employment with the School Division excepting those positions agreed to be excluded in local bargaining between the School Division and the Association. Effective March 4, 2020, clause 1.1 above is repealed and replaced by the following clause:

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except:

Time is Money Join Law Insider Premium to draft better contracts faster.