Detector Controls Sample Clauses

Detector Controls. Offline Computing
AutoNDA by SimpleDocs
Detector Controls. Detector Controls 100.00% 100.00% Trigger/DAQ 6. 37,410 3.34% 34.67% 2.73% 2.25% 5.51% 0.24% 0.27% 1.07% 5.51% 0.68% 14.70% 1.34% 2.27% 23.39% 2.04%
Detector Controls. Offline Computing 7.1. Offline Infrastructure Infrastructure 8.1. Access and Survey 8.2. General Installation 8.3. Cooling and Ventilation 8.4. Safety 8.5. Fixed Cranes 8.6. Shielding Systems Commissioning & Integration 9.1. Additional facilities for Commissioning on surface 9.2. Detector Installation, Opening and Access Facilities 9.3. General Services Annex 6 : Overview of Technical Participation of Institutes in Detector Construction. Institutes Participation System Ref. and Name Subsystem Ref. 2. 3. 4. 5. 6. Common Tracker ECAL HCAL Muon Detector T-DAQ Projects Code Institute Name 2.1. 2.2. 2.3. 2.4. 2.5. 2.6. 2.7. 2.8. 3.1. 3.2. 4.1. 4.2. 4.3. 4.5. 5.1. 5.2. 5.3. 5.4. 5.5. 5.6. 6.1. 6.2. AR1 Yerevan Physics Institute • • AT1 Institut fur Hochenergiephysik der OeAW • • • • • • • BE1 Universite Catholique de Louvain • • BE2 Universite de Mons-Hainaut • • BE3 Universite Libre de Bruxelles • • BE4 Universiteit Antwerpen • • BE5 Vrije Universiteit Brussel • • XX0 Xxxxxxxxx for Nuclear Research and Nuclear Energy • • • BG2 University of Sofia • • • BR1 Universidade do Estado do Rio de Janeiro • BR2 Instituto de Fisica - Universidade Federal do Rio de Janeiro • BR3 Centro Brasileiro de Pesquisas Fisicas • BR4 Instituto de Fisica Teorica-Universidade Estadual Paulista • BY1 Byelorussian State University • • BY2 Research Institute for Nuclear Problems • • BY3 National Centre for Particle and High Energy Physics • • • BY4 Research Institute of Applied Physical Problems • CERN CERN, European Organization for Nuclear Research • • • • • • • • • • • • • XX0 Xxxxxxxxx of High Energy Physics • • • • CN2 University for Science and Technology of China • • CN3 Peking University • • CO1 Universidad de Los Andes • CR1 Technical University of Split • CR2 University of Split • CR3 Institute Xxxxxx Xxxxxxxx • CY1 University of Cyprus • DE2 Institut fur Experimentelle Kernphysik • • • • • DE3 RWTH, I. Physikalisches Institut • • • • • • DE4 RWTH, III. Physikalisches Institut A • DE5 RWTH, III. Physikalisches Institut B • • • DE6 University of Hamburg • DE7 Deutsches Elektronen-Synchrotron • • EE1 National Institute of Chemical Physics and Biophysics • FI1 Department of Physical Sciences University of Helsinki • • • FI2 Helsinki Institute of Physics • • • FI6 Laboratory of Advanced Energy Systems, Helsinki University of Technology • FI7 Lappeenranta University of Technology • • FR1 Laboratoire Leprince-Ringuet, Ecole Polytechnique, IN2P3-CNRS • FR2 Laboratoire d'Annecy-le-Vieu...

Related to Detector Controls

  • Access Controls The system providing access to PHI COUNTY discloses to 20 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY 21 must use role based access controls for all user authentications, enforcing the principle of least privilege.

  • TIA Controls If any provision of this Indenture limits, qualifies, or conflicts with another provision which is required to be included in this Indenture by the TIA, the required provision shall control.

  • Sxxxxxxx-Xxxxx; Internal Accounting Controls The Company and the Subsidiaries are in compliance with any and all applicable requirements of the Sxxxxxxx-Xxxxx Act of 2002 that are effective as of the date hereof, and any and all applicable rules and regulations promulgated by the Commission thereunder that are effective as of the date hereof and as of the Closing Date. The Company and the Subsidiaries maintain a system of internal accounting controls sufficient to provide reasonable assurance that: (i) transactions are executed in accordance with management’s general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with GAAP and to maintain asset accountability, (iii) access to assets is permitted only in accordance with management’s general or specific authorization, and (iv) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences. The Company and the Subsidiaries have established disclosure controls and procedures (as defined in Exchange Act Rules 13a-15(e) and 15d-15(e)) for the Company and the Subsidiaries and designed such disclosure controls and procedures to ensure that information required to be disclosed by the Company in the reports it files or submits under the Exchange Act is recorded, processed, summarized and reported, within the time periods specified in the Commission’s rules and forms. The Company’s certifying officers have evaluated the effectiveness of the disclosure controls and procedures of the Company and the Subsidiaries as of the end of the period covered by the most recently filed periodic report under the Exchange Act (such date, the “Evaluation Date”). The Company presented in its most recently filed periodic report under the Exchange Act the conclusions of the certifying officers about the effectiveness of the disclosure controls and procedures based on their evaluations as of the Evaluation Date. Since the Evaluation Date, there have been no changes in the internal control over financial reporting (as such term is defined in the Exchange Act) of the Company and its Subsidiaries that have materially affected, or is reasonably likely to materially affect, the internal control over financial reporting of the Company and its Subsidiaries.

  • Xxxxxxxx-Xxxxx; Internal Accounting Controls The Company and the Subsidiaries are in compliance with any and all applicable requirements of the Xxxxxxxx-Xxxxx Act of 2002 that are effective as of the date hereof, and any and all applicable rules and regulations promulgated by the Commission thereunder that are effective as of the date hereof and as of the Closing Date. The Company and the Subsidiaries maintain a system of internal accounting controls sufficient to provide reasonable assurance that: (i) transactions are executed in accordance with management’s general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with GAAP and to maintain asset accountability, (iii) access to assets is permitted only in accordance with management’s general or specific authorization, and (iv) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences. The Company and the Subsidiaries have established disclosure controls and procedures (as defined in Exchange Act Rules 13a-15(e) and 15d-15(e)) for the Company and the Subsidiaries and designed such disclosure controls and procedures to ensure that information required to be disclosed by the Company in the reports it files or submits under the Exchange Act is recorded, processed, summarized and reported, within the time periods specified in the Commission’s rules and forms. The Company’s certifying officers have evaluated the effectiveness of the disclosure controls and procedures of the Company and the Subsidiaries as of the end of the period covered by the most recently filed periodic report under the Exchange Act (such date, the “Evaluation Date”). The Company presented in its most recently filed periodic report under the Exchange Act the conclusions of the certifying officers about the effectiveness of the disclosure controls and procedures based on their evaluations as of the Evaluation Date. Since the Evaluation Date, there have been no changes in the internal control over financial reporting (as such term is defined in the Exchange Act) of the Company and its Subsidiaries that have materially affected, or is reasonably likely to materially affect, the internal control over financial reporting of the Company and its Subsidiaries.

  • Administrative Controls The Contractor must have the following controls in place: a. A documented security policy governing the secure use of its computer network and systems, and which defines sanctions that may be applied to Contractor staff for violating that policy. b. If the Data shared under this agreement is classified as Category 4, the Contractor must be aware of and compliant with the applicable legal or regulatory requirements for that Category 4 Data. c. If Confidential Information shared under this agreement is classified as Category 4, the Contractor must have a documented risk assessment for the system(s) housing the Category 4 Data.

  • Audit Controls a. System Security Review. CONTRACTOR must ensure audit control mechanisms that record and examine system activity are in place. All systems processing and/or storing PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have at least an annual system risk assessment/security review which provides assurance that administrative, physical, and technical controls are functioning effectively and providing adequate levels of protection. Reviews should include vulnerability scanning tools.

  • Plan Controls The terms contained in the Plan are incorporated into and made a part of this Agreement and this Agreement shall be governed by and construed in accordance with the Plan. In the event of any actual or alleged conflict between the provisions of the Plan and the provisions of this Agreement, the provisions of the Plan shall be controlling and determinative.

  • Internal Accounting Controls The Company and each of its subsidiaries maintain a system of internal accounting controls sufficient to provide reasonable assurance that (i) transactions are executed in accordance with management's general or specific authorizations, (ii) transactions are recorded as necessary to permit preparation of financial statements in conformity with generally accepted accounting principles and to maintain asset accountability, (iii) access to assets is permitted only in accordance with management's general or specific authorization and (iv) the recorded accountability for assets is compared with the existing assets at reasonable intervals and appropriate action is taken with respect to any differences.

  • Technical Security Controls 35 a. Workstation/Laptop encryption. All workstations and laptops that store PHI COUNTY 36 discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of 37 COUNTY either directly or temporarily must be encrypted using a FIPS 140-2 certified algorithm which 1 is 128bit or higher, such as AES. The encryption solution must be full disk unless approved by the 2 COUNTY.

  • Controls Each party will maintain commercially reasonable administrative, technical, and physical controls designed to protect data in its possession or under its control from unauthorised access, accidental loss and unauthorised modification. You are responsible for implementing administrative, technical, and physical controls that are appropriate for your business.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!