Hardware Alarm Pins Sample Clauses

Hardware Alarm Pins. The CFP2 Module supports alarm hardware pins as listed in Table 2-3. Specifications of the CFP2 hardware alarm pins are given in Reference [1]. Pin # Symbol Description I/O Logic “H” “L” Pull-up /down 20 PRG_ALRM1 Programmable Alarm 1 MSA Default: HIPWR_ON O 3.3V LVCMOS Active High per CFP MSA MIS Ref. [7] 21 PRG_ALRM2 Programmable Alarm 2 MSA Default: MOD_READY, Ready state has been reached O 3.3V LVCMOS 22 PRG_ALRM3 Programmable Alarm 3 MSA Default: MOD_FAULT O 3.3V LVCMOS 25 RX_LOS Receiver Loss of Signal O 3.3V LVCMOS Loss of Signal OK 27 MOD_ABS Module Absent O 3.3V LVCMOS Absent Present Pull Down2
AutoNDA by SimpleDocs
Hardware Alarm Pins. ‌ The CFP4 Module supports alarm hardware pins as listed in Table 1-2. Specifications of the CFP4 hardware alarm pins are given in Ref.[1]. Pin # Symbol Description I/O Logic “H” “L” Pull-up /down 12 RX_LOS (PRG_ALRM) Receiver Loss of Signal (Optionally configurable as Programmable Alarm after Reset1) O 3.3V LVCMOS Loss of Signal2 OK2 1 When Programmable Alarm is configured, MSA Default is HIPWR_ON. 2 Active High per CFP MSA MIS Ref. [3] when PRG_ALRM is configured for this pin.
Hardware Alarm Pins. The CFP Module supports alarm hardware pins, listed in Table 2-3: Hardware Alarm Pins. Pin # Symbol Description I/O Logic “H” “L” Pull-up /down 33 PRG_ALRM1 Programmable Alarm 1 MSA Default: HIPWR_ON O 3.3V LVCMOS Active High per MDIO document [5] 34 PRG_ALRM2 Programmable Alarm 2 MSA Default: MOD_READY, Ready state has been reached O 3.3V LVCMOS 35 PRG_ALRM3 Programmable Alarm 3 MSA Default: MOD_FAULT O 3.3V LVCMOS
Hardware Alarm Pins. Functional Description‌
Hardware Alarm Pins non-MDIO The CFP Module supports alarm, control and monitor functions via hardware pins and via an MDIO bus. Upon module initialization, these functions are available. The CFP uses pins in the electrical connector for alarm signals, listed in Table 2-3: Hardware Alarm Pins. Pin # Symbol Description I/O Logic “H” “L” Pull-up /down 33 PRG_ALRM1 Programmable Alarm 1 MSA Default: RXS, RX CDR Lock Indicator O 3.3V LVCMOS Active High per MDIO document [5] 34 PRG_ALRM2 Programmable Alarm 2 MSA Default: HIPWR_ON O 3.3V LVCMOS 35 PRG_ALRM3 Programmable Alarm 3 MSA Default: MOD_READY, initialization sequence done O 3.3V LVCMOS 40 RX_LOS Receiver Loss of Signal O 3.3V LVCMOS Loss of Signal OK
Hardware Alarm Pins. Functional Description Per specifications given in CFP MSA Hardware Specification, Revision 1.4, June 7, 2010 [1].

Related to Hardware Alarm Pins

  • Hardware NCR Voyix may offer you the option to purchase or subscribe to Hardware. Hardware provided may not be new but may be like-new, except for Hardware purchased from NCR Voyix, which will be new. Delivery of the Hardware will be made to your designated Licensed Site(s). All Hardware purchased by you directly from NCR Voyix or from a Reseller for use in the United States, including Alaska and Hawaii, includes a standard 30-day non-transferable warranty against defects in manufacture, beginning on the date of purchase. Damage from wear and tear, misuse and other factors are not covered.

  • Hardware and Software In order to use the Services, you must obtain and maintain, at your expense, compatible hardware and software as specified by Credit Union from time to time. Credit Union is not responsible for any third party software you may need to use the Services. Any such software is accepted by you as is and is subject to the terms and conditions of the software agreement you enter into directly with the third party software provider at time of download and installation.

  • Software Inclusions Restrictions

  • Customer Property Customer Property is and shall remain your sole and exclusive property. “Customer Property” means all graphic user interface, text, content, images, video, music, designs, products, computer programs, drawings, documentation and other materials of any kind posted, submitted, provided or otherwise made available to us by you or an Authorized User in connection with the Products and Services. Customer Property may also contain Personal Information which is defined in Section 5.

  • TOOL STORAGE 1. A company shall provide on all construction jobs in towns and cities, and elsewhere where reasonably necessary and practicable (or if requested buy the employee), a suitable and secure waterproof lock-up solely for the purpose of storing employees’ tools, and on multi-storey and major projects the company shall provide, where possible, a suitable lock-up for employees’ tools within a reasonable distance of the work area of large groups of employees. 2. Where an employee is absent from work because of illness or accident and has advised the company in accordance with Clause 33 – Personal Leave of the award, the company shall ensure that the employee’s tools are securely stored during his/her absence.

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Customer Equipment “Customer Equipment” means any Customer-owned or provided software, hardware or services that you elect to use in connection with the Service(s). You agree to allow us and our agents the rights to insert CableCARDs and other hardware in the Customer Equipment, send software and/or downloads to the Customer Equipment and install, configure, maintain, inspect and upgrade the Customer Equipment. You warrant you are either the owner of the Customer Equipment or that you have the authority to give us access to the Customer Equipment. You should call Customer Service at 0-000-XXX-XXXX to find out if it meets our technical, security and other requirements. We reserve the right to disallow the use of Customer Equipment that we determine is not compatible with our network. We shall have no obligation to provide, maintain, or service Customer Equipment, including, but not limited to, Customer Equipment to which the Company or a third party has sent software or downloads. If you use Customer Equipment, you agree that the following limitation of liability shall apply: THE COMPANY DOES NOT WARRANT THAT CUSTOMER EQUIPMENT WILL ENABLE YOU TO SUCCESSFULLY INSTALL, ACCESS, OPERATE, OR USE THE SERVICE(S). YOU ACKNOWLEDGE THAT ANY SUCH INSTALLATION, ACCESS, OPERATION, OR USE COULD CAUSE CUSTOMER EQUIPMENT TO FAIL TO OPERATE OR COULD CAUSE DAMAGE TO CUSTOMER EQUIPMENT, YOU, YOUR PREMISES OR COMPANY EQUIPMENT. NEITHER THE COMPANY NOR ANY OF ITS AFFILIATES, SUPPLIERS OR AGENTS SHALL HAVE ANY LIABILITY WHATSOEVER FOR ANY SUCH FAILURE OR DAMAGE, INCLUDING LACK OF 911/E911 CAPABILITY OR DIALING ASSOCIATED WITH A SECURITY SYSTEM. YOUR USE OF CUSTOMER EQUIPMENT MAY PREVENT PROVISION OF SERVICE. The foregoing limitation of liability is in addition to and shall not limit any other limitation of liability set forth in this Agreement.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!