Dynamic Link Library ( Sample Clauses

Dynamic Link Library (. DLL) The .DLL in the Basic Edition allows custom software applications to control one Cyclone unit. Users wishing to use a .DLL to control more than one Cyclone or who would prefer to use RS232/Ethernet protocols (e.g., in a non-Windows environment) may purchase the appropriate advanced version of the Cyclone Automated Control Package.
AutoNDA by SimpleDocs

Related to Dynamic Link Library (

  • Library CONTRACTOR shall provide an inmate law library in compliance with Rule 33-501.301, F.A.C., FDC’s Policy 501.301, and ACA Standards.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Platforms Except where explicitly stated otherwise, these terms apply to Optimized Service (denoted with a “+” and sometimes referred to as Rapid Delivery) and non-Optimized Services Ethernet Access and Network Services Local Access Service. In particular, standard and optional features that apply to both are set out in this General Section 1. Section 2 (Available Versions) describes the characteristics particular to Optimized Service – Access +, and then to the non-Optimized Services – Ethernet Access and Network Services Local Access Service.

  • Librarian An employee who has mastered the field of library science to a level adequate for him or her to provide leadership in the development and operation of a library in his or her area of specialization. The minimum qualification is a Master’s degree, or equivalent.

  • Unbundled Copper Loop – Designed (UCL-D) 2.4.2.1 The UCL-D will be provisioned as a dry copper twisted pair (2- or 4-wire) Loop that is unencumbered by any intervening equipment (e.g., filters, load coils, range extenders, digital loop carrier, or repeaters).

  • Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Technical Interfaces 3.2.6.1 The Interconnection facilities provided by each Party shall be formatted using either Alternate Xxxx Inversion (AMI) line code with Superframe format framing or Bipolar 8-Zero Substitution with Extended Superframe (B8ZS ESF) format framing or any mutually agreeable line coding and framing.

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

Time is Money Join Law Insider Premium to draft better contracts faster.