We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Graphical User Interfaces Sample Clauses

Graphical User InterfacesEach Party shall ensure that graphical user interfaces can be protected as industrial design in accordance with its respective laws and regulations.
Graphical User Interfaces. 1. The RIIM system shall provide configurable Graphical User Interfaces screens that are customized (and freely customizable at a subsequent time) to only display alarm and monitoring data that is relevant based upon a user’s role and responsibilities. 2. The RIIM system GUI shall provide a uniform manner for users to perform common monitoring functions across similar equipment. 3. The RIIM system GUI shall be able to run on workstation computers as well as portable devices including tablets and smart phones. 4. The RIIM system GUI shall display real-time events and alarm data on a graphical map-based display with simultaneous display of alarm lists maintenance actions. 5. The RIIM system GUI shall overlay icons representing assets on two-dimensional maps based upon GIS coordinates of the asset such that the icon’s location on the model/map accurately represents the physical location of the asset it represents.
Graphical User Interfaces. 1. The PSIMS shall provide configurable Graphical User Interface (GUI) screens that are customized to display and allow control of only the relevant information based upon a user’s role and responsibilities. 2. The PSIMS GUI shall support multiple windows providing video, text, dialog boxes, maps, and menus required by users to perform their daily functions. 3. The PSIMS GUI shall provide a uniform manner for users to perform common monitoring and control functions across the subtending systems. 4. The PSIMS GUI shall run on workstation computers as well as portable devices including tablets and smart phones. 5. The PSIMS GUI shall display real-time events and alarm data on a graphical map-based display with simultaneous display of alarm lists, response plans, and video tiles for monitoring live and recorded video associated with events across multiple computer monitors. 6. The PSIMS GUI shall display three-dimensional models of buildings and stations. 7. The PSIMS GUI shall overlay icons representing assets on three-dimensional models and two- dimensional maps based upon Geographic Information System (GIS) coordinates of the asset such that the icon’s location on the model/map accurately represents the physical location of the asset it represents. 8. The PSIMS shall support multi-level drill down/up between map views. 9. The PSIMS shall automatically bring up map views of locations most relevant to an incident based on external trigger inputs associated with the incident.
Graphical User InterfacesFigure 25Online Bidding Process Interfaces
Graphical User InterfacesTASK LEADER – FORTH-ICS
Graphical User Interfaces. Develop comfortable user interfaces for multimedia terminals with interactive displays. Interaction with patients can be personalised and contain feedback and clinical pathway adjustments, automatically generated context aware risk assessments and general material for education of the patient, instructions for insulin injection, calculation of insulin dose, etc. An internal deliverable Design criteria for Graphical User Interfaces will be distributed at M12. D3.1 Specification and concept for disposable ePatch platform (M18) 2.1 1st generation e-patch, report on ePatch technology & integration results (M12) D3. 2.2 Final generation e-patch, report on ePatch technology & integration results (M48) D3.3 SOLIANIS Impedance Spectroscopy CGM sensors (M12) D3.4 SOLIANIS Impedance Spectroscopy AGC sensors (M36) D3.5 IMM IR breadbord device (M12) D3.6 IMM IR CGM prototype (M30) D3.7 IMM IR AGC prototype (M36) D3.8 Report on glucose sensor development (M18) D3.9 Sensors for glucose measurement for 1st field trials, 2nd generation e-patch (M30)

Related to Graphical User Interfaces

  • Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Network Interface Device 4.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s on-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable. 4.1.1 BellSouth shall permit Al-Call to connect Al-Call ’s loop facilities to on-premises wiring through the BellSouth NID or at any other technically feasible point.

  • Programming Phase Schematic Design Phase: 2.2.1.3. Design Development Phase:

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • Technical Interfaces 3.2.6.1 The Interconnection facilities provided by each Party shall be formatted using either Alternate Mark Inversion (AMI) line code with Superframe format framing or Bipolar 8-Zero Substitution with Extended Superframe (B8ZS ESF) format framing or any mutually agreeable line coding and framing.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: xxxx://xxx.xxx.xxx/E-Verify.