File Size, Storage and Bandwidth Limitations Sample Clauses

File Size, Storage and Bandwidth Limitations. The following file size and bandwidth limitations apply to website Subscription Services (besides the ones used in conjunction with the Mobile Website Design Services) offered by Network Solutions:
AutoNDA by SimpleDocs

Related to File Size, Storage and Bandwidth Limitations

  • ROAD DIMENSIONS Purchaser shall perform road work in accordance with the dimensions shown on the TYPICAL SECTION SHEET and the specifications within this road plan.

  • CLASS SIZE/STAFFING LEVELS The board will make every effort to limit FDK/Grade 1 split grades where feasible. APPENDIX A – RETIREMENT GRATUITIES

  • Copper Subloops Sprint will make available access to copper subloops on an unbundled basis. A copper subloop is a portion of a Copper Loop, or Hybrid Loop, and is comprised entirely of copper wire or copper cable that acts as a transmission facility between any accessible terminal in Sprint’s outside plant, including inside wire owned or controlled by Sprint, and the end-user customer premises. A copper subloop can also include intermediate devices, such as repeaters, used to establish the transmission path. Copper subloops can be used by CLEC to provide voice-grade services as well as digital subscriber line services. Access to copper subloops is subject to the collocation provisions of this Agreement. Copper subloop consists of the distribution portion of the copper loop. Sprint is not obligated to offer feeder loop plant as a stand-alone UNE.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • INTERNET-BASED SERVICES Microsoft provides Internet-based services with the software. It may change or cancel them at any time.

  • wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.

  • Bandwidth the amount of data (quantified as “Mbps” or “Gbps”) made available to Customer as specified in a Service Order.

  • Number Resources, Rate Center Areas and Routing Points 13.1 Nothing in this Agreement shall be construed to limit or otherwise adversely affect in any manner either Party’s right to employ or to request and be assigned any Central Office Codes (“NXX”) pursuant to the Central Office Code Assignment Guidelines and any relevant FCC or Commission orders, as may be amended from time to time, or to establish, by Tariff or otherwise, Rate Center Areas and Routing Points corresponding to such NXX codes.

  • General Availability The commitment to availability specified in the letter of appointment shall be subject to mutually acceptable revision. Such revision will occur once per year, or, if mutually agreed between the Employer and the employee, on a more frequent basis. The Employer will issue a revised letter of appointment to reflect approved changes to employee’s general availability.

  • Misuse of Internet-based Services You may not use these services in any way that could harm them or impair anyone else’s use of them. You may not use the services to try to gain unauthorized access to any service, data, account or network by any means.

Time is Money Join Law Insider Premium to draft better contracts faster.