Initial Setup Sample Clauses

Initial Setup. Jurisdiction shall furnish the following items in order to use the SUTS System:
AutoNDA by SimpleDocs
Initial Setup. Initial setup consists of:
Initial Setup. The Agency will provide assistance to ICOE staff during the initial setup of the services. These activities include but are not limited to:
Initial Setup. Verily will provide County personnel with: (i) the Playbook, (ii) training on the Platform, including the scheduling and booking system required for County personnel to input schedule and test availability at the site, and (iii) a recommendation for requisition and label printing hardware. Each County will be responsible for establishing appropriate IT and internet infrastructure.
Initial Setup. After the Effective Date, Browns Hill will install, configure, and otherwise prepare the equipment described on Exhibit A, and configure the System to prepare it for implementation. Browns Hill shall notify FRUITA once the System is ready for implementation, and the parties shall jointly determine the System Implementation Date. Implementation will be conducted by Browns Hill in cooperation with FRUITA, and FRUITA shall ensure that the necessary FRUITA staff are available to assist with implementation as determined necessary by Browns Hill.
Initial Setup. Provider will use commercially reasonable effors to have the Services available for Customer with fifteen (15) business days of (i) receipt of payment of the One-Time Onboarding Fee and (ii) upon Provider’s receipt of all required data and information from Customer.
Initial Setup. Verily will provide County personnel with: (i) the Playbook and (ii) training on the Platform as necessary for County and/or Site to support testing operations and perform the activities required under this Agreement, including the scheduling and booking system required for County personnel to input schedule and test availability at the site.
AutoNDA by SimpleDocs
Initial Setup. Vendor will be charged $125.00 for the initial table set up in the Vendor Area. Each initial table will consist of:
Initial Setup. The principal goal of the setup is for each MANET member to build their own individual definition of normal behavior, which will be ultimately used during admission control. MANET members are not clients or servers but rather peers i.e., all members are considered equal and can execute client or server activities simultaneously. As a result, MANET members can have both input and out- put behavior profiles for the same service (port). Throughout, we assume that the behavior profiles are computed from previous interactions of the device or alternatively are provided as built-in profiles from the vendor. We further as- sume that the profiles of the initial MANET members are clean and provide an accurate representation of the typical behavior in the MANET. During setup, all the initial members broadcast their output behavior pro- files to all the other MANET members. Each member proceeds to calculate the distance between its own input behavior profile and the output behavior profiles received from the other devices. Given the distributed nature of the mechanism, MANET members are only required to provide their output behavior profiles. This step prevents any member from crafting attacks based on the knowledge of the input profiles of the others. The distance between a member i and each of the other MANET members j = 1, .., n is given by di,j = d(Pi,in, Pj,out), where Pi,in is the input behavior profile for i and Pj,out is the output behav- ior profile received from node j. Each pair (Pj,out, di,j) computed by member i is then stored as an entry Qi[j] in its local table Qi. The entries are sorted by member i according to their distance values such that the closest profiles to Pi,in are placed at the top of the table. In general, distances can be interpreted as a measure of confidence between a local device and the rest of the MANET members. Specifically, profiles at shorter distances would be trusted more than their more distant counterparts. Armed with its sorted table, each MANET member proceeds to calculate its local threshold τi that will determine acceptance or rejection of new devices during admission control. The threshold τi is defined as the maximum distance between its input profile Pi,in and its top t-1 most similar/trusted profiles. In this context, t corresponds to the value from the (t,n) threshold cryptographic scheme. Thus, τi = Qi[t − 1], where Qi[t − 1] represents the t − 1th entry at the local table of member i. Simultaneously, the members of...
Initial Setup. It is Licensee's sole responsibility to determine whether the Software is appropriate for Licensee's business needs and is compatible with Licensee's existing computer system and software programs. Express Evaluations will provide commercially reasonable technical support to Licensee at the commencement of the Term to ensure that Licensee is capable of accessing and using the Software. This technical support shall include access to user materials, online demos, and email support.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!