Hardware Alarm Pins Sample Clauses

Hardware Alarm Pins. ‌ The CFP4 Module supports alarm hardware pins as listed in Table 1-2. Specifications of the CFP4 hardware alarm pins are given in Ref.[1]. Table 1-2: Hardware Alarm Pins Pin # Symbol Description I/O Logic “H” “L” Pull-up /down 12 RX_LOS (PRG_ALRM) Receiver Loss of Signal (Optionally configurable as Programmable Alarm after Reset1) O 3.3V LVCMOS Loss of Signal2 OK2 1 When Programmable Alarm is configured, MSA Default is HIPWR_ON. 2 Active High per CFP MSA MIS Ref. [3] when PRG_ALRM is configured for this pin.
AutoNDA by SimpleDocs
Hardware Alarm Pins. The CFP2 Module supports alarm hardware pins as listed in Table 2-3. Specifications of the CFP2 hardware alarm pins are given in Reference [1]. Table 2-3: Hardware Alarm Pins Pin # Symbol Description I/O Logic “H” “L” Pull-up /down 20 PRG_ALRM1 Programmable Alarm 1 MSA Default: HIPWR_ON O 3.3V LVCMOS Active High per CFP MSA MIS Ref. [7] 21 PRG_ALRM2 Programmable Alarm 2 MSA Default: MOD_READY, Ready state has been reached O 3.3V LVCMOS 22 PRG_ALRM3 Programmable Alarm 3 MSA Default: MOD_FAULT O 3.3V LVCMOS 25 RX_LOS Receiver Loss of Signal O 3.3V LVCMOS Loss of Signal OK 27 MOD_ABS Module Absent O 3.3V LVCMOS Absent Present Pull Down2
Hardware Alarm Pins. Functional Description‌
Hardware Alarm Pins. The CFP Module supports alarm hardware pins, listed in Table 2-3: Hardware Alarm Pins. Table 2-3: Hardware Alarm Pins Pin # Symbol Description I/O Logic “H” “L” Pull-up /down 33 PRG_ALRM1 Programmable Alarm 1 MSA Default: HIPWR_ON O 3.3V LVCMOS Active High per MDIO document [5] 34 PRG_ALRM2 Programmable Alarm 2 MSA Default: MOD_READY, Ready state has been reached O 3.3V LVCMOS 35 PRG_ALRM3 Programmable Alarm 3 MSA Default: MOD_FAULT O 3.3V LVCMOS
Hardware Alarm Pins non-MDIO The CFP Module supports alarm, control and monitor functions via hardware pins and via an MDIO bus. Upon module initialization, these functions are available. The CFP uses pins in the electrical connector for alarm signals, listed in Table 2-3: Hardware Alarm Pins. Table 2-3: Hardware Alarm Pins Pin # Symbol Description I/O Logic “H” “L” Pull-up /down 33 PRG_ALRM1 Programmable Alarm 1 MSA Default: RXS, RX CDR Lock Indicator O 3.3V LVCMOS Active High per MDIO document [5] 34 PRG_ALRM2 Programmable Alarm 2 MSA Default: HIPWR_ON O 3.3V LVCMOS 35 PRG_ALRM3 Programmable Alarm 3 MSA Default: MOD_READY, initialization sequence done O 3.3V LVCMOS 40 RX_LOS Receiver Loss of Signal O 3.3V LVCMOS Loss of Signal OK
Hardware Alarm Pins. Functional Description Per specifications given in CFP MSA Hardware Specification, Revision 1.4, June 7, 2010 [1].

Related to Hardware Alarm Pins

  • Hardware IF HARDWARE IS IDENTIFIED ON A TRANSACTION DOCUMENT, THE SALE AND USE OF THE HARDWARE WILL BE GOVERNED BY TERMS OTHER THAN THIS XXXX. OT DISCLAIMS ALL WARRANTIES AND LIABILITY WITH RESPECT TO THE HARDWARE.

  • Hardware and Software In order to use the Services, you must obtain and maintain, at your expense, compatible mobile hardware and software as specified by Credit Union from time to time. Credit Union is not responsible for any third party software you may need to use the Services. Any such software is accepted by you as is and is subject to the terms and conditions of the software agreement you enter into directly with the third party software provider at time of download and installation.

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

  • Customer Property Customer Property is and shall remain your sole and exclusive property. “Customer Property” means all graphic user interface, text, content, images, video, music, designs, products, computer programs, drawings, documentation and other materials of any kind posted, submitted, provided or otherwise made available to us by you or an Authorized User in connection with the Products and Services. Customer Property may also contain Personal Information which is defined in Section 5.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Client Software You may only use the client software with the ERP solution. You may install an unlimited number of copies of the client software to access your ERP solution.

  • TOOL STORAGE 1. A company shall provide on all construction jobs in towns and cities, and elsewhere where reasonably necessary and practicable (or if requested buy the employee), a suitable and secure waterproof lock-up solely for the purpose of storing employees’ tools, and on multi-storey and major projects the company shall provide, where possible, a suitable lock-up for employees’ tools within a reasonable distance of the work area of large groups of employees.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

Time is Money Join Law Insider Premium to draft better contracts faster.