C UTE Intelligent Workstation Sample Clauses

C UTE Intelligent Workstation. (IWS) CUTE Intelligent Workstation (IWS) is a standard computer capable of hosting all required platforms, application software, and related peripherals. CUTE Intelligent Workstation (IWS) je standardní počítač, který je schopen hostovat veškeré požadované platformy a aplikační software a související periferie. Each IWS has a hard drive and network interface and is pre-configured so that network communication and connection with CUTE server are established during IWS boot. Generally, IWS hard drives do not contain host user software; it is loaded from CUTE server after the user is verified. Každá IWS má pevný disk a síťové rozhraní a je předem nakonfigurována tak, aby při bootování IWS byla navazována síťová komunikace a vytvořeno spojení se serverem CUTE. Obecně, pevné disky na IWS neobsahují hostitelský uživatelský software; ten je zaváděn ze serveru CUTE poté, co byl uživatel ověřen. Furthermore, the workstations do not have disk units and are not able to load any other software than that offered by CUTE server. This means that the workstations work only as secure and controlled elements within the AirportConnect CUTE architecture and never act as independent equipment. In addition to being absolutely secure, there is no need to administer anything on the workstation except the hardware itself. Dále, pracovní stanice nemají disketové jednotky a nemají možnost zavést software jiný než ten, který nabízí server CUTE. Znamená to tedy, že pracovní stanice fungují pouze jako bezpečné a kontrolované prvky v rámci architektury AirportConnect CUTE a nikdy jako nezávislá zařízení. Kromě toho, že jsou zcela bezpečné, není potřeba na pracovní stanici nic spravovat, s výjimkou samotného hardwaru.  IWS operating platform  Operační platforma IWS Microsoft Windows 7 in combination with SITA VPS32 middleware is used to run the certified applications written with CUTE SDK. Only the applications using common peripherals or gateways must be developed in SDK; other applications written for one of the supported operating environments, which only have the user interface and do not need to use the peripherals, can be also run on the workstation. The workstation is even capable of running the original applications written for ARINC-DOS or Windows 3.1. K provozování certifikovaných aplikací napsaných pomocí CUTE SDK se používá operační systém Microsoft Windows 7 v kombinaci s middleware SITA VPS32. Pouze aplikace používající společné periférie nebo brány je nutné vyvinout v SD...
AutoNDA by SimpleDocs

Related to C UTE Intelligent Workstation

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Firmware The Contractor shall deliver firmware required for production acceptance testing in accordance with CDRL A009 Contractor’s Supplier Configuration Management Plan. The Contractor shall use Government furnished software for testing. Deliverable Data Item (See DD-1423): CDRL A009: “Contractor’s Supplier Configuration Management Plan”

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!