Detector Controls Sample Clauses

Detector Controls. Offline Computing 7.1. Offline Infrastructure Infrastructure 8.1. Access and Survey 8.2. General Installation 8.3. Cooling and Ventilation 8.4. Safety 8.5. Fixed Cranes 8.6. Shielding Systems Commissioning & Integration 9.1. Additional facilities for Commissioning on surface 9.2. Detector Installation, Opening and Access Facilities 9.3. General Services Annex 5 : Management Structure of the CMS Collaboration. THE CMS CONSTITUTION Ref 1: CMS/D-CB/1996-1 Ref 2: RRB CMS D99-59 13 September 1996 Amended on 11 December 1998 Revised on 19 June 2003 Revised on 26 June 2006 Annex 6 : Overview of Technical Participation of Institutes in Detector Construction. Institutes Participation System Ref. and Name Subsystem Ref. 2. 3. 4. 5. 6. Common Tracker ECAL HCAL Muon Detector T-DAQ Projects Code Institute Name 2.1. 2.2. 2.3. 2.4. 2.5. 2.6. 2.7. 2.8. 3.1. 3.2. 4.1. 4.2. 4.3. 4.5. 5.1. 5.2. 5.3. 5.4. 5.5. 5.6. 6.1. 6.2. AR1 Yerevan Physics Institute • • AT1 Institut fur Hochenergiephysik der OeAW • • • • • • • BE1 Universite Catholique de Louvain • • BE2 Universite de Mons-Hainaut • • BE3 Universite Libre de Bruxelles • • BE4 Universiteit Antwerpen • • BE5 Vrije Universiteit Brussel • • XX0 Xxxxxxxxx for Nuclear Research and Nuclear Energy • • • BG2 University of Sofia • • • BR1 Universidade do Estado do Rio de Janeiro • BR2 Instituto de Fisica - Universidade Federal do Rio de Janeiro • BR3 Centro Brasileiro de Pesquisas Fisicas • BR4 Instituto de Fisica Teorica-Universidade Estadual Paulista • BY1 Byelorussian State University • • BY2 Research Institute for Nuclear Problems • • BY3 National Centre for Particle and High Energy Physics • • • BY4 Research Institute of Applied Physical Problems • CERN CERN, European Organization for Nuclear Research • • • • • • • • • • • • • XX0 Xxxxxxxxx of High Energy Physics • • • • CN2 University for Science and Technology of China • • CN3 Peking University • • CO1 Universidad de Los Andes • CR1 Technical University of Split • CR2 University of Split • CR3 Institute Xxxxxx Xxxxxxxx • CY1 University of Cyprus • DE2 Institut fur Experimentelle Kernphysik • • • • • DE3 RWTH, I. Physikalisches Institut • • • • • • DE4 RWTH, III. Physikalisches Institut A • DE5 RWTH, III. Physikalisches Institut B • • • DE6 University of Hamburg • DE7 Deutsches Elektronen-Synchrotron • • EE1 National Institute of Chemical Physics and Biophysics • FI1 Department of Physical Sciences University of Helsinki • • • FI2 Helsinki Institute of Physics • • • FI6 Labo...
AutoNDA by SimpleDocs
Detector Controls. 7. Offline Computing
Detector Controls. 6.3 Detector Controls 100.00% 100.00% Trigger/DAQ 6. 37,410 3.34% 34.67% 2.73% 2.25% 5.51% 0.24% 0.27% 1.07% 5.51% 0.68% 14.70% 1.34% 2.27% 23.39% 2.04%

Related to Detector Controls

  • Expansive Controls Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes will not be used to circumvent normal trunk servicing. Expansive controls will only be used when mutually agreed to by the Parties.

  • Access Controls a. Authorized Access - DST shall have controls that are designed to maintain the logical separation such that access to systems hosting Fund Data and/or being used to provide services to Fund will uniquely identify each individual requiring access, grant access only to authorized personnel based on the principle of least privileges, and prevent unauthorized access to Fund Data.

  • Administrative Controls The Contractor must have the following controls in place:

  • Audit Controls P. Contractor agrees to an annual system security review by the County to assure that systems processing and/or storing Medi-Cal PII are secure. This includes audits and keeping records for a period of at least three (3) years. A routine procedure for system review to catch unauthorized access to Medi-Cal PII shall be established by the Contractor.

  • User IDs and Password Controls All users must be issued a unique user name for accessing DHCS PHI or PI. Username must be promptly disabled, deleted, or the password changed upon the transfer or termination of an employee with knowledge of the password, at maximum within 24 hours. Passwords are not to be shared. Passwords must be at least eight characters and must be a non-dictionary word. Passwords must not be stored in readable format on the computer. Passwords must be changed every 90 days, preferably every 60 days. Passwords must be changed if revealed or compromised. Passwords must be composed of characters from at least three of the following four groups from the standard keyboard: • Upper case letters (A-Z) • Lower case letters (a-z) • Arabic numerals (0-9) • Non-alphanumeric characters (punctuation symbols)

  • Smoke Detectors At Owner's expense, smoke detectors will be installed on the Property in working condition in accordance with the law prior to the tenant's occupancy. During the occupancy, it shall be the tenant's responsibility to maintain all smoke detectors. Owner will replace smoke detector equipment as needed.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Controls Each party will maintain commercially reasonable administrative, technical, and physical controls designed to protect data in its possession or under its control from unauthorised access, accidental loss and unauthorised modification. You are responsible for implementing administrative, technical, and physical controls that are appropriate for your business.

  • Accounting Controls The Company and its Subsidiaries maintain systems of “internal control over financial reporting” (as defined under Rules 13a-15 and 15d-15 under the Exchange Act Regulations) that comply with the requirements of the Exchange Act and have been designed by, or under the supervision of, their respective principal executive and principal financial officers, or persons performing similar functions, to provide reasonable assurance regarding the reliability of financial reporting and the preparation of financial statements for external purposes in accordance with GAAP, including, but not limited to, internal accounting controls sufficient to provide reasonable assurance that (i) transactions are executed in accordance with management’s general or specific authorizations; (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with GAAP and to maintain asset accountability; (iii) access to assets is permitted only in accordance with management’s general or specific authorization; and (iv) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences. Except as disclosed in the Registration Statement, the Pricing Disclosure Package and the Prospectus, the Company is not aware of any material weaknesses in its internal controls. The Company’s auditors and the Audit Committee of the Board of Directors of the Company have been advised of: (i) all significant deficiencies and material weaknesses in the design or operation of internal controls over financial reporting which are known to the Company’s management and that have adversely affected or are reasonably likely to adversely affect the Company’ ability to record, process, summarize and report financial information; and (ii) any fraud known to the Company’s management, whether or not material, that involves management or other employees who have a significant role in the Company’s internal controls over financial reporting.

  • Personal Controls a. Employee Training. All workforce members who assist in the performance of functions or activities on behalf of COUNTY in connection with Agreement, or access or disclose PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, must complete information privacy and security training, at least annually, at CONTRACTOR’s expense. Each workforce member who receives information privacy and security training must sign a certification, indicating the member’s name and the date on which the training was completed. These certifications must be retained for a period of six (6) years following the termination of Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.