Computer virtualization prototype description Sample Clauses

Computer virtualization prototype description. 4.3.1 Different actions implemented • Add a CD-ROM iso image to a virtual machine Associates an iso image stored in a VMware data store (it can be a local hard disk or a NFS server) as a CD-ROM of a virtual machine placed in the same host where the data store is. • Add virtual NIC to a virtual machine Adds to a virtual machine a virtual NIC associated to a specific port group defined in the host where the virtual machine is placed. • Change number of virtual CPUs of a virtual machine Changes the number of virtual CPUs configured in a virtual machine. • Change the port group associated to a virtual NIC Changes the port group associated to a virtual NIC. The potential port groups to be used are the ones which are configured in the same host where the virtual NIC is placed. • Change virtual machine disk size Changes the size of a virtual hard disk associated to a virtual machine. The new size needs to be bigger or equal than the original. • Change virtual machine RAM size Changes the virtual RAM size of a virtual machine. • Copy a virtual machine Copies a virtual machine configuring remote VNC access (VMware functionality that permits configuring VNC access for virtual machines with the IP address of the host and a specific VNC port starting from 5900). It also configures the new virtual hardware specification (hard disk and RAM size, the number of CPUs and the different virtual NICs with its port groups) in the virtual machine copy (the original virtual machine can have hardware configuration which is not the one that fits in the requester requirements). • Copy a virtual machine defining virtual NICs The same as the previous action plus defining virtual NICs specifying the port group where they will be associated. • Create a virtual machine Creates a virtual machine specifying the number of virtual CPUs, the size of the virtual main hard disk and RAM. • Create a virtual machine associating an iso image as the main CD-ROM The same as the previous action plus associating an iso image as the main virtual CD-ROM of the virtual machine. • Create a virtual machine associating an iso image as the main CD-ROM defining the virtual NICs The same as the previous action plus defining the virtual NICs specifying the port group associated to them. • Create a virtual hard disk and add it to a virtual machine Creates a virtual hard disk with a specific size and adds it to the virtual hard disk list of a virtual machine. • Get inventory of a host Gets the inventory (data sto...
AutoNDA by SimpleDocs

Related to Computer virtualization prototype description

  • COMPUTER SOFTWARE The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • COVID-19 Protocols Contractor will abide by all applicable COVID-19 protocols set forth in the District’s Reopening and COVID-19 Mitigation Plan and the safety guidelines for COVID-19 prevention established by the California Department of Public Health and the Ventura County Department of Public Health.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Computer Access Where possible, providing no additional costs are incurred by the Employer, one (1) authorized representative of each Union shall be entitled to submit for posting on the Employer's electronic communication system one electronic Union notice per month for members of the bargaining unit. The Employer shall determine the method of distribution. The Employer shall review all proposed notices and retain a discretion not to post any notice that it deems unlawful or contrary to the Employer’s interests, which discretion shall not be unreasonably exercised. The Union agrees to indemnify the Employer for any liability arising out of offensive or otherwise unlawful notices posted by the Union. Nothing in this Article requires a change to distribution practices that existed prior to April 1, 2015.

Time is Money Join Law Insider Premium to draft better contracts faster.