Fault Log History Sample Clauses

Fault Log History. ‌ The FAULT_LOG_HISTORY is used to read the 242 byte event data of the unit. The fault log history data stores up to 4 event data sets. If the event data sets exceed 4, the oldest data set shall be removed to give way for the latest data set (first in, first out). Unused history data sets shall have a value of zero for all registers. This command is using MODBUS Function Read File Record. Each data set is a file record containing up to 242 bytes. Here is a sample table of the power supply event data which contains up to 242 bytes of data: Registers Size in Byte PSU Status Register 2 General Alarm Status Register 2 PFC Alarm Status Register 2 Secondary Alarm Status Register 2 Discharger Alarm Status Register 2 Aux Alarm Status Register 2 Temperature Alarm Status Register 2 Fan Alarm Status Register 2 Communication Alarm Status Register 2 PSU_Input Voltage AC 2 PSU_Input Current AC 2 PSU_Output Voltage (main converter) 2 PSU_Output Current (main converter) 2 AC Line Frequency 1 TOTAL_TIME 4 TIME_SINCE_LAST_ON 4 AC Power Cycles (# of times of cold start) 2 AC Outages (# of times step-up converter turns on due to AC input out of range, not including SoH test) 2 AC Input Voltage (20 samples @ 1ms) 40 AC Input Current (20 samples @ 1ms) 40 Main Output Voltage (20 samples @ 1ms) 40 Main Output Current (20 samples @ 1ms) 40 Temp0 – Inlet (5 samples @ 5 sec) 10 Temp1 – Outlet (5 samples @ 5 sec) 10 RPM Fan 0 (5 samples @ 5 sec) 10 Time stamping 4 Power factor 2 Input current total harmonics 2 Total 242
AutoNDA by SimpleDocs

Related to Fault Log History

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where InterGlobe has requested an Unbundled Loop and BellSouth uses IDLC systems to provide the local service to the End User and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to InterGlobe. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for InterGlobe (e.g. hairpinning):

  • Fire Fighting Costs of operating and maintaining the fire-fighting equipments and personnel, if any.

  • HELMETS TO HARDHATS Section 1. The Contractors and the Unions recognize a desire to facilitate the entry into the building and construction trades of veterans who are interested in careers in the building and construction industry. The Contractors and Unions agree to utilize the services of the Center for Military Recruitment, Assessment and Veterans Employment (hereinafter “Center”) and the Center’s “Helmets to Hardhats” program to serve as a resource for preliminary orientation, assessment of construction aptitude, referral to apprenticeship programs or hiring halls, counseling and mentoring, support network, employment opportunities and other needs as identified by the parties.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Flexible Work Schedule A flexible work schedule is any schedule that is not a regular, alternate, 9/80, or 4/10 work schedule and where the employee is not scheduled to work more than 40 hours in the "workweek" as defined in Subsections F. and H., below.

  • Therapist Availability Therapist’s office is equipped with a confidential voice mail system that allows Patient to leave a message at any time. Therapist will make every effort to return calls within 24 hours (or by the next business day), but cannot guarantee the calls will be returned immediately. Therapist is unable to provide 24-hour crisis service. In the event that Patient is feeling unsafe or requires immediate medical or psychiatric assistance, he/she should call 911, or go to the nearest emergency room.

Time is Money Join Law Insider Premium to draft better contracts faster.