Data Delivery Interface Sample Clauses

Data Delivery Interface. The SDS Land PEATE stages products required for CERES processing on NPP in the same manner as the MODIS Adaptive Processing System (MODAPS) system stages products from MODIS for CERES processing on Earth Observing System (EOS) Terra and Aqua missions. Specifically, the SDS Land PEATE delivers products to a directory on a GSFC File transfer Protocol (FTP) server and the ASDC pulls products from this server using FTP. The Science Investigator-led Processing System (SIPS) Interface, defined in Reference #9, will be used to transfer data products from the FTP server at GSFC to the ASDC to automate the product delivery process. The delivery process includes: verifying the integrity of products delivered, retransmitting missing or defective products, and deleting successfully delivered products from the FTP server.
AutoNDA by SimpleDocs

Related to Data Delivery Interface

  • Network Interface Device 4.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s on-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable. 4.1.1 BellSouth shall permit Al-Call to connect Al-Call ’s loop facilities to on-premises wiring through the BellSouth NID or at any other technically feasible point.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • SERVICE DELIVERABLES You will receive service on the Covered Product as described below: Carry-In: Unless otherwise provided in this Agreement, the Covered Product must be shipped or delivered and retrieved by You at Our authorized service center during normal business hours. In-Home/On-Site: Service will be performed in Your home or on-site as indicated on the Declarations Page of this Agreement, or on Your sales receipt or invoice provided You have fulfilled the following requirements: (1) provide Our authorized technician with accessibility to the Covered Product; (2) provide a non-threatening and safe environment for Our authorized technician; and (3) an adult over the age of 18 must be present for the period of time Our authorized technician is scheduled to provide service and while Our authorized technician is on Your property servicing the Covered Product. In-Home Service will be provided by Our authorized service provider during regular business hours, local time, Monday through Friday, except holidays. Our authorized service center may opt to remove the Covered Product to perform service in-shop. The Covered Product will be returned upon completion. Additional time and mileage charges for in-home repairs outside of twenty-five (25) contiguous land miles or the normal service radius of Our authorized service center are not covered by this Agreement, and are Your responsibility.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Service Delivery Grantee shall: 1. Adhere to the Priority Populations for Treatment Programs as stated in the SUD UM Guidelines. 2. Maintain Daily Capacity Management Report in CMBHS as required in the SUD UM Guidelines. 3. Maintain a Waiting List to track all eligible individuals who have been screened but cannot be admitted to SUD treatment immediately. i. Grantee that has an individual identified as a federal and state priority population on the waiting list shall confirm this in the Daily Capacity Management Report. ii. Grantee shall arrange for appropriate services in another treatment facility or provide access to interim services as indicated within 48 hours when efforts to refer to other appropriate services are exhausted. iii. Grantee shall offer directly or through referral interim services to wait-listed individuals. iv. Establish a wait list that includes priority populations and interim services while awaiting admission to treatment services. v. Develop a mechanism to maintain contact with individuals awaiting admission. 4. If unable to provide admissions to individuals within Priority Populations for Treatment Programs according to SUD UM Guidelines: i. Implement written procedures that address maintaining weekly contact with individuals waiting for admissions as well as what referrals are made when a client cannot be admitted for services immediately. ii. When Grantee cannot admit a client, who is at risk for dangerous for withdrawal, Grantee shall ensure that an emergency medical care provider is notified. iii. Coordinate with an alternate provider for immediate admission. iv. Notify Substance Use Disorder (Xxxxxxxxx_Xxx_Xxxxxxxx@xxxx.xxxxx.xx.xx) so that assistance can be provided that ensures immediate admission to other appropriate services and proper coordination when appropriate. v. Provide pre-admission service coordination to reduce barriers to treatment, enhance motivation, stabilize life situations, and facilitate engagement in treatment. vi. Adhere to Informed Consent Document for Opioid Use Disorder applicable to the individual as stated in the SUD UM Guidelines. vii. When an individual is placed on the Wait List, Grantee shall document interim services as referrals that provides applicable testing, counseling, and treatment for Human Immunodeficiency Virus (HIV), tuberculosis (TB) and sexually transmitted infections (STIs).

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • One-Way Interconnection Trunks 2.3.1 Where the Parties use One-Way Interconnection Trunks for the delivery of traffic from Onvoy to Frontier, Onvoy, at Xxxxx’s own expense, shall: 2.3.1.1 provide its own facilities for delivery of the traffic to the technically feasible Point(s) of Interconnection on Frontier’s network in a LATA; and/or 2.3.1.2 obtain transport for delivery of the traffic to the technically feasible Point(s) of Interconnection on Frontier’s network in a LATA (a) from a third party, or, (b) if Frontier offers such transport pursuant to a Frontier access Tariff, from Frontier. 2.3.2 For each Tandem or End Office One-Way Interconnection Trunk group for delivery of traffic from Onvoy to Frontier with a utilization level of less than sixty percent (60%) for final trunk groups and eighty-five percent (85%) for high usage trunk groups, unless the Parties agree otherwise, Onvoy will promptly submit ASRs to disconnect a sufficient number of Interconnection Trunks to attain a utilization level of approximately sixty percent (60%) for all final trunk groups and eighty-five percent (85%) for all high usage trunk groups. In the event Onvoy fails to submit an ASR to disconnect One-Way Interconnection Trunks as required by this Section, Frontier may disconnect the excess Interconnection Trunks or bill (and Onvoy shall pay) for the excess Interconnection Trunks at the rates set forth in the Pricing Attachment. 2.3.3 Where the Parties use One-Way Interconnection Trunks for the delivery of traffic from Frontier to Onvoy, Frontier, at Frontier’s own expense, shall provide its own facilities for delivery of the traffic to the technically feasible Point(s) of Interconnection on Frontier’s network in a LATA.

  • Contract Deliverables The Contractor shall provide information technology staff augmentation services, including comprehensive management of staff, as set forth in this Contract. The term “staff” refers to the temporary staff provided by the Contractor to render information technology services identified by Customers, but that staff shall not be deemed an employee of the State or deemed to be entitled to any benefits associated with such employment. Contracts resulting from this solicitation should not be structured as fixed-price agreements or used for any services requiring authorization for payment of milestone tasks. Contractor shall only provide information technology staff augmentation services for those Job Titles awarded to the Contractor and shall be paid on an hourly basis. The Department’s intent is for Contractor’s information technology staff to provide services closely related to those described in the Job Family Descriptions document. Detailed scopes of work, specific requirements of the work to be performed, and any requirements of staff shall be provided by the Customer in a Request for Quote. The Contractor shall possess the professional and technical staff necessary to allocate, outsource, and manage qualified information technology staff to perform the services requested by the Customer. The Contractor shall provide Customers with staff who must have sufficient skill and experience to perform the services assigned to them. All of the information technology staff augmentation services to be furnished by the Contractor under the Contract shall meet the professional standards and quality that prevails among information technology professionals in the same discipline and of similar knowledge and skill engaged in related work throughout Florida under the same or similar circumstances. The Contractor shall provide, at its own expense, training necessary for keeping Contractor’s staff abreast of industry advances and for maintaining proficiency in equipment and systems that are available on the commercial market. The Contractor shall be responsible for the administration and maintenance of all employment and payroll records, payroll processing, remittance of payroll and taxes, and all administrative tasks required by state and federal law associated with payment of staff. The Contractor shall, at its own expense, be responsible for adhering to the Contract background screening requirements, testing, evaluations, advertising, recruitment, and disciplinary actions of Contractor’s information technology staff. The Contractor shall maintain during the term of the Contract all licenses, permits, qualifications, insurance and approvals of whatever nature that are legally required to perform the information technology staff augmentation services.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!