Cyber Infrastructure Sample Clauses

Cyber Infrastructure. Cyber infrastructure consists of the underlying technologies that are crucial for cyber superiority. The concepts of correctness and acceptability are at the core of cyber infrastructure. Correctness is a theoretical concept motivated by the "computational" side of cyber. Cyber does not exist without computation. Acceptability is the practical side of cyber. It is motivated by the rest of the infrastructure. If infrastructure is defined as being composed of computing, communications, physical, and human components, then correctness is concerned with computing and communications. Acceptability is concerned with the physical and human components.
AutoNDA by SimpleDocs
Cyber Infrastructure. 4.1.7.1 Research, develop, enhance, and integrate technologies to establish the correctness of cyber infrastructure, including sensors, computers, servers, networks, and systems. Include both the correctness of systems that are built from scratch and systems whose correctness needs to be established after the fact.

Related to Cyber Infrastructure

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Utility Infrastructure During the term of this Agreement, Company will have the right to receive water, sanitary sewer, electric, storm drainage, telecommunication and data services at the Premises.

  • Infrastructure Improvements The design, redevelopment and construction and completion of certain infrastructure improvements, including sewer, stormwater, electrical and water main improvements, along with other similar improvements.

  • Information regarding Interconnection Facilities 4.2.1 The SPD shall be required to obtain all information from the STU/CTU/concerned authority with regard to the Interconnection Facilities as is reasonably necessary to enable it to design, install and operate all interconnection plant and apparatus on the SPD’s side of the Delivery Point to enable delivery of electricity at the Delivery Point. The transmission of power up to the point of interconnection where the metering is done for energy accounting shall be the responsibility of the SPD at his own cost.

  • Network Interconnection 26.1 Interconnection between the networks of different SERVICE PROVIDERs shall be as per National Standards of CCS No.7 issued from time to time by Telecom Engineering Centre (TEC) and also subject to technical feasibility and technical integrity of the Networks and shall be within the overall framework of interconnection regulations issued by the TRAI from time to time. However, if situation so arises, INTERCONNECTION with R2MF signaling may be permitted by LICENSOR.

  • One-Way Interconnection Trunks 2.3.1 Where the Parties have agreed to use One-Way Interconnection Trunks for the delivery of traffic from PCS to Verizon, PCS, at PCS’s own expense, shall:

  • Two-Way Interconnection Trunks 2.4.1 Where the Parties have agreed to use Two-Way Interconnection Trunks for the exchange of traffic between Verizon and VarTec, VarTec shall order from Verizon, and Verizon shall provide, the Two-Way Interconnection Trunks and the Entrance Facility, on which such Trunks will ride, and transport and multiplexing, in accordance with the rates, terms and conditions set forth in this Agreement and Verizon’s applicable Tariffs.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Energy Resource Interconnection Service (ER Interconnection Service).

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

Time is Money Join Law Insider Premium to draft better contracts faster.