Code Porting Sample Clauses

Code Porting. Before the code is ported, you need to choose a compiler supported by SenseLock EL. In this sample, Xxxx C51 is selected. This chapter describes only necessary parts for the configuration of the Xxxx C51 compiler. For more details about the usage of the compiler, please refer to Chapter 5 ―Direction for Compiler Usage‖. 3.2.1. Create a Senselock EL Project
AutoNDA by SimpleDocs

Related to Code Porting

  • LABOR CODE REQUIREMENTS The Contractor shall comply with all applicable provisions of the California Labor Code, Division 3, Part 7, Chapter 1, Articles 1 – 5, including, without limitation, the payment of the general prevailing per diem wage rates for public work projects of more than one thousand dollars ($1,000). Copies of the prevailing rate of per diem wages are on file with the District or available online at xxxx://xxx.xxx.xx.xxx/. In addition, the Contractor and each subcontractor shall comply with Chapter 1 of Division 2, Part 7 of the California Labor Code, beginning with Section 1720, and including Section 1735, 1777.5 and 1777.6, forbidding discrimination, and Sections 1776, 1777.5 and 1777.6 concerning the employment of apprentices by Contractor or subcontractors. Willful failure to comply may result in penalties, including loss of the right to bid on or receive public works contracts.

  • Transit Traffic 7.2.2.3.1 CenturyLink will accept traffic originated by CLEC’s network and/or its end user(s) for termination to other Telecommunications Carrier’s network and/or its end users that is connected to CenturyLink's Switch. CenturyLink will also terminate traffic from these other Telecommunications Carriers’ network and/or its end users to CLEC’s network and/or its end users. For purposes of the Agreement, transit traffic does not include traffic carried by Interexchange Carriers. That traffic is defined as Jointly Provided Switched Access. 7.2.2.3.2 The Parties involved in transporting transit traffic will deliver calls to each involved network with CCS/SS7 protocol and the appropriate ISUP/TCAP messages to facilitate full Interoperability and Billing functions. 7.2.2.3.3 The originating company is responsible for payment of appropriate rates to the transit company and to the terminating company. The Parties agree to enter into traffic exchange agreements with third party Telecommunications Carriers prior to delivering traffic to be transited to third party Telecommunications Carriers. In the event one Party originates traffic that transits the second Party’s network to reach a third party Telecommunications Carrier with whom the originating Party does not have a traffic exchange agreement, then the originating Party will indemnify, defend and hold harmless the second Party against any and all charges levied by such third party Telecommunications Carrier, including any termination charges related to such traffic and any attorneys fees and expenses. In the case of IntraLATA LEC Toll traffic where CenturyLink is the designated IntraLATA Toll provider for existing LECs, CenturyLink will be responsible for payment of appropriate usage rates. 7.2.2.3.4 When CenturyLink receives an unqueried call from CLEC to a telephone number that has been ported to another local services provider, the transit rate will apply in addition to any query rates. 7.2.2.3.5 In the case of a transit call that terminates in the Local Calling Area but in a different state than the call originated, and the CLEC does not have an agreement with CenturyLink in the state where the transit call terminated, CLEC must execute an agreement for that state if it is a state served by CenturyLink. In the absence of a second agreement, the transit rate in Exhibit A of this Agreement will be billed to the CLEC.

  • TOOL STORAGE 1. A company shall provide on all construction jobs in towns and cities, and elsewhere where reasonably necessary and practicable (or if requested buy the employee), a suitable and secure waterproof lock-up solely for the purpose of storing employees’ tools, and on multi-storey and major projects the company shall provide, where possible, a suitable lock-up for employees’ tools within a reasonable distance of the work area of large groups of employees. 2. Where an employee is absent from work because of illness or accident and has advised the company in accordance with Clause 33 – Personal Leave of the award, the company shall ensure that the employee’s tools are securely stored during his/her absence.

  • Bulk Migration 2.1.9.1 If Southern Telecom requests to migrate twenty-five (25) or more UNE- Port/Loop Combination (UNE-P) customers to UNE-Loop (UNE-L) in the same Central Office on the same due date, Southern Telecom must use the Bulk Migration process, which is described in the BellSouth CLEC Information Package, “UNE-Port/Loop Combination (UNE-P) to UNE-Loop (UNE-L) Bulk Migration.” This CLEC Information package, incorporated herein by reference as it may be amended from time to time, is located at xxx.xxxxxxxxxxxxxxx.xxxxxxxxx.xxx/xxxxxx/xxxx/xxxx.xxxx. The rates for the Bulk Migration process shall be the nonrecurring rates associated with the Loop type being requested on the Bulk Migration, as set forth in Exhibit A of this Attachment. Additionally, OSS charges will also apply per LSR generated per customer account as provided for in the Bulk Migration Request. The migration of loops from Integrated Digital Loop Carrier (IDLC) will be done pursuant to Section 2.6 of this Attachment.

  • Cloud storage DSHS Confidential Information requires protections equal to or greater than those specified elsewhere within this exhibit. Cloud storage of Data is problematic as neither DSHS nor the Contractor has control of the environment in which the Data is stored. For this reason: (1) DSHS Data will not be stored in any consumer grade Cloud solution, unless all of the following conditions are met: (a) Contractor has written procedures in place governing use of the Cloud storage and Contractor attests in writing that all such procedures will be uniformly followed. (b) The Data will be Encrypted while within the Contractor network. (c) The Data will remain Encrypted during transmission to the Cloud. (d) The Data will remain Encrypted at all times while residing within the Cloud storage solution. (e) The Contractor will possess a decryption key for the Data, and the decryption key will be possessed only by the Contractor and/or DSHS. (f) The Data will not be downloaded to non-authorized systems, meaning systems that are not on either the DSHS or Contractor networks. (g) The Data will not be decrypted until downloaded onto a computer within the control of an Authorized User and within either the DSHS or Contractor’s network. (2) Data will not be stored on an Enterprise Cloud storage solution unless either: (a) The Cloud storage provider is treated as any other Sub-Contractor, and agrees in writing to all of the requirements within this exhibit; or, (b) The Cloud storage solution used is FedRAMP certified. (3) If the Data includes protected health information covered by the Health Insurance Portability and Accountability Act (HIPAA), the Cloud provider must sign a Business Associate Agreement prior to Data being stored in their Cloud solution.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • ISM Code and ISPS Code compliance All requirements of the ISM Code and the ISPS Code as they relate to the Borrowers, the Approved Manager and the Ships have been complied with.

  • Alcohol Testing Alcohol testing will be conducted by using an evidential breath testing device (EBT) approved by the National Highway Traffic Safety Administration. Non-EBT devices may be used for initial screening tests. A screening test will be conducted first. If the result is an alcohol concentration level of less than 0.02, the test is considered a negative test. If the alcohol concentration level is 0.02 or more, a second confirmation test will be conducted. Levels of .04 or greater on the confirmation test will be considered positive.

  • CONTRACT WORK HOURS AND SAFETY STANDARDS As per the Contract Work Hours and Safety Standards Act (40 U.S.C. 3701-3708), where applicable, all Customer Purchase Orders in excess of ,000 that involve the employment of mechanics or laborers must include a provision for compliance with 40 U.S.C. 3702 and 3704, as supplemented by Department of Labor regulations (29 CFR Part 5). Under 40 U.S.C. 3702 of the Act, each contractor must be required to compute the wages of every mechanic and laborer on the basis of a standard work week of 40 hours. Work in excess of the standard work week is permissible provided that the worker is compensated at a rate of not less than one and a half times the basic rate of pay for all hours worked in excess of 40 hours in the work week. The requirements of 40 U.S.C. 3704 are applicable to construction work and provide that no laborer or mechanic must be required to work in surroundings or under working conditions which are unsanitary, hazardous or dangerous. These requirements do not apply to the purchases of supplies or materials or articles ordinarily available on the open market, or contracts for transportation or transmission of intelligence.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!