Combining the Protocols Sample Clauses

Combining the Protocols. We now combine the advantage distillation from Lemma 4.22 with the one-message key agreement protocol from Theorem 4.14. This will give our protocol for key agreement with arbitrary messages. —
AutoNDA by SimpleDocs

Related to Combining the Protocols

  • Marketing the Property In an effort to properly and efficiently market the Property, the Seller grants the following permissions to the Agency: (Initial ALL That Apply) - Advertise the Property. - To use the Property’s street address when advertising the Property. - Allow third (3rd) party websites to create estimated market values of the Property. - Allow the Agency to disclose the existence of other offers on the Property. - Publish any and all Property information electronically or in print. This includes, but is not limited to, the Multiple Listing Service (MLS), real estate websites, newspapers, etc. - Place a lockbox or key box on the Property. The Seller shall hold harmless the Agency and all cooperating licensees from all responsibility and liability resulting from any loss, damage, or theft which might occur while the Property is listed by the Agency under this Agreement. - Authorize a “For Sale” Sign on the Property.

  • Following the Previous Example If TIPS offers a one-year extension, the expiration of the extended term shall be May 31, 2024. TIPS may offer to extend Vendor Agreements to the fullest extent the original Solicitation permits.

  • Expansive Protocols Where the capability exists, originating or terminating traffic reroutes may be implemented by either party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes will not be used to circumvent normal trunk servicing. Expansive controls will only be used when mutually agreed to by the parties.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Development of the Property Except as modified by this Agreement, the Development and the Property will be developed in accordance with all applicable local, state, and federal regulations, including but not limited to the City’s ordinances and the zoning regulations applicable to the Property, and such amendments to City ordinances and regulations that that may be applied to the Development and the Property under Chapter 245, Texas Local Government Code, and good engineering practices (the “Applicable Regulations”). If there is a conflict between the Applicable Regulations and the Development Standards, the Development Standards shall control.

  • Access to Software Access Rights to Software which is Results shall comprise: Access to the Object Code; and, where normal use of such an Object Code requires an Application Programming Interface (hereafter API), Access to the Object Code and such an API; and, if a Party can show that the execution of its tasks under the Project or the Exploitation of its own Results is technically or legally impossible without Access to the Source Code, Access to the Source Code to the extent necessary. Background shall only be provided in Object Code unless otherwise agreed between the Parties concerned.

  • IDENTIFYING THE PROBLEM During the early stages of problem detection, the NMC will be able to tell which CLECs are affected by the catastrophe. Further analysis and/or first hand observation will determine if the disaster has affected CLEC equipment only, BellSouth equipment only or a combination. The initial restoration activity will be largely determined by the equipment that is affected. Once the nature of the disaster is determined and after verifying the cause of the problem, the NMC will initiate reroutes and/or transfers that are jointly agreed upon by the affected CLECs' Network Management Center and the BellSouth NMC. The type and percentage of controls used will depend upon available network capacity. Controls necessary to stabilize the situation will be invoked and the NMC will attempt to re-establish as much traffic as possible. For long-term outages, recovery efforts will be coordinated by the ECC. Traffic controls will continue to be applied by the NMC until facilities are re-established. As equipment is made available for service, the ECC will instruct the NMC to begin removing the controls and allow traffic to resume.

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Development of the Project 4.1 TSP's obligations in development of the Project: Subject to the terms and conditions of this Agreement, the TSP at its own cost and expense shall observe, comply with, perform, undertake and be responsible:

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

Time is Money Join Law Insider Premium to draft better contracts faster.