COMMAND LINE INTERFACE Sample Clauses

COMMAND LINE INTERFACE. The Contract Wizard also provides a command line interface (TUI, short for text user interface) to add contracts to a .NET assembly. The input options and the application flow have changed slightly compared to the initial version developed by Xxxxxxx Xxxxxxx. Refer to chapter 6.4.3 for a guided tour about how to use the command line of the Contract Wizard. The following section describes the modifications in the respective class files. The class CONTRACT_WIZARD_TUI (originally called APPLICATION) handles the user input from the command line. Some changes in the class CONTRACT_WIZARD_TUI were necessary because the GUI and the TUI use the same class files; other changes are optimizations. I added the notion of project to the Contract Wizard. Therefore the text interface creates a project file from its input. It takes the path to the assembly file (an_assembly_path) and checks if the file exists. If this is not the case it terminates the application, otherwise the TUI extracts the name of the assembly (an_assembly_name) from the assembly path. Afterwards it gets the name of the project (a_project_name) by taking the assembly path without the extension .dll or .exe. The “wizard” only continues if the specified working directory exists. Now the TUI has enough information to create a project file, respectively a project handler (CW_PROJECT_HANDLER). The TUI needs no longer to care about loading the assembly from the assembly path; this job is done by the project handler. If the user wants to remove all contracts from an assembly, the TUI deletes the XML file from the project directory and launches the compiler to generate an assembly without contracts. The old version did not start the compilation thus the actual contracted .NET assembly remained unchanged. The TUI does not provide an option to edit existing contracts anymore. It comes from the location where the generated XML file is stored. Originally the “wizard” stored it in a subdirectory of the global assembly cache (GAC) and it was not accessible to the user outside the TUI environment. Now the XML file is stored in the project directory and the user can edit its content at any time. The feature add_contracts reads the contracts from a file and uses the contract handler (CW_CONTRACT_HANDLER) to add the contracts to the corresponding classes and features. Before the contract handler adds an invariant to a class, it checks whether the class already contains the same invariant. It also inspects the existing ...
AutoNDA by SimpleDocs
COMMAND LINE INTERFACE. Software licensed by PDQ in the enterprise mode is enabled with a Command Line Interface (“CLI”) mode of operation. This allows the Administrator to send deployment or scan requests to a Software console. The license required with CLI is the same as it is for all other aspects of the Software, in that it is licensed, and license fees may be charged, by PDQ to Licensee on a per Administrator or Enterprise SL License basis. Any Licensee employee or independent contractor who initiates, through whatever method, deployment or scan operations using the Software is considered an Administrator for licensing purposes.
COMMAND LINE INTERFACE. ‌ The executable responsible for processing model checking queries is called rtt-mbt-mc and can be found in the RTT-MBT installation folder. This executable can be used as a command-line tool for checking LTL queries. In order to check an LTL query the following arguments need to be provided as command-line arguments: • -model <XMI-FILE> specifies the model on which model checking should be performed. The model should be in the form of an XMI file exported by Modelio. • -spec <LTL-QUERY> specifies the LTL-query string to check.
COMMAND LINE INTERFACE. You can create data bases and scripts of commonly used commands and easily apply them to multiple units in your infrastructure using RAD’s new command line interface. Security To ensure client-server communication privacy and correct user authentication, ETX-220A supports the security protocols listed below:  SNMPv3  RADIUS (client authentication)  TACACS+ (client authentication)  SSH for Secure Shell communication session.
COMMAND LINE INTERFACE. Verify that the command line functions within provided guidelines and that the level of debugging and troubleshooting interfaces is sufficient.
COMMAND LINE INTERFACE 

Related to COMMAND LINE INTERFACE

  • System and Data Access Services a.System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Metering The Interconnection Customer shall be responsible for the Connecting Transmission Owner’s reasonable and necessary cost for the purchase, installation, operation, maintenance, testing, repair, and replacement of metering and data acquisition equipment specified in Attachments 2 and 3 of this Agreement. The Interconnection Customer’s metering (and data acquisition, as required) equipment shall conform to applicable industry rules and Operating Requirements.

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • Interconnection 2.2.10 Startup Testing and Commissioning

  • Information Systems Acquisition Development and Maintenance Security of System Files. To protect City Information Processing Systems and system files containing information, Service Provider will ensure that access to source code is restricted to authorized users whose specific job function necessitates such access.

Time is Money Join Law Insider Premium to draft better contracts faster.