Install method Sample Clauses

Install method. Can be mounted with screws, double sided tape (included), or on a tripod.
AutoNDA by SimpleDocs

Related to Install method

  • Billing Method 1.5.1 To receive payment for services rendered under this contract, the Contractor shall submit a fully completed invoice for work previously performed to: Minneapolis Public Housing Authority Attention: Accounts Payable, Suite 307 0000 Xxxxxxxxxx Xxx X, Xxxxxxxxxxx, XX 00000 or: xxxxxxxx@xxxxxxx.xxx

  • ICE Method The method used to calculate One-Month LIBOR, as described in Section 3.05.

  • NETWORK INTERCONNECTION METHODS 64.1 This Section sets forth the terms and conditions for Network Interconnection Methods (NIMs) provided between CenturyLink and CLEC for the Interconnection Facilities established between the Parties’ networks. Additionally, this Section describes the physical architecture for the Interconnection of the Parties’ facilities and equipment required for the transmission and routing of Local Traffic, ISP-Bound Traffic, IntraLATA LEC Toll Traffic, VoIP-PSTN Traffic, Transit Traffic and Jointly Provided Switched Access Service Traffic.

  • System Upgrades The Connecting Transmission Owner shall procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Attachment 6 of this Agreement. To the extent that design work is necessary in addition to that already accomplished in the Class Year Interconnection Facilities Study for the Interconnection Customer, the Connecting Transmission Owner shall perform or cause to be performed such work. If all the Parties agree, the Interconnection Customer may construct System Upgrade Facilities and System Deliverability Upgrades.

  • Procurement Method (a) Quality-Based Selection (b) Selection under a Fixed Budget

  • Test method 3.3.1. The method used shall be that described in Annex 3, paragraph 3.1.

  • Construction Methods No four course of brick-work, with three joints, shall exceed in height, when built, one inch more than the same bricks piles upon one another without mortar. The bricks are to be well soaked in water before use on works, in proper through so as to be thoroughly wet when layed. The Cessation of the bubbles through the water is an irldication of saturation being complete. For ensuring thorough soaking of the bricks every one or two bricklayers or more as necessary, shall be provided with tubs for use The wall of structures shall be carried up regularly in all cases 1` when the nature of the work will admit of it not leaving any part 915mm (3 feet) lower than another. Horizontal courses shalI be straight, level and even and faces of walls smooth and plumb. A straight edge and a plumb- xxx shall be used for constant checking during progress of the work. No brick-bats shall be permitted to be used except when necessary for obtaining the dimension of the different course or for obtaining the specified bond. All unfinished work must be raked back in course unless otherwise directed arid when new work is to be jointed to it the surface of unfinished work must be cleaned and wetted. The bricks shall be laid by placing sufficient mortar on the wall and forcing every brick into it in such a manner as to completely fill every joint with moratar whether at the bottom, side or end of the brick. The mortar to be used shall be that specified for the relevant schedule items and shall comply with the specification for the mortar specified. The bound used shall be English and shall be carried throughout the work. At all angles forming the junction of any two walls, the bricks shall, at each alternate course be carried into each of the respective walls, so as to thoroughly unite the work. V'Jhen the faces are to be plastered, the joints shall be well raked out before any plaster is laid on should the plaster from want of proper joint ranking detach and 7 fall off from the brick work, the contractor shall strip off the plaster bodily to the extent ordered by Superintending Engineer and shall re-do the work properly at his own expense. All requisite scaffolding shall be provided at the contractor's expense and shall be double i.e., must it have two sets of upright supports Care must be taken to ensure the safety of the work people and the contractor must comply with such instructions as the Superintending Engineer may issue to ensure such safety. The contractor will be entirely responsible for any damage or injuries to person or property resulting from ill-erected scaffolding, defective ladders, or otherwise arising out of his default in this respect. The brick work for the retaining wall shall proceed side by side with the depositing and compacting of earth between the retaining walls. At no time shall the brick-work be constructed more than 405mm (1'-4") above Y the compacted earth. In the retaining wall weep-holes shall be provided at suitable intervals as instructed during execution, with the inner surface of the weep-holed plastered 20mm (3/4") thick in cement mortar 1:4 crouched rock of grades in different layer shall be provided at the inner end of the weep-holes to prevent the choking of the weep-holes to have full drainage. No extra payment will be made for this and no deductions will be made for this in the brick-work.

  • Measurement method An isolation resistance test instrument is connected between the live parts and the electrical chassis. The isolation resistance is subsequently measured by applying a DC voltage at least half of the working voltage of the high voltage bus. If the system has several voltage ranges (e.g. because of boost converter) in conductively connected circuit and some of the components cannot withstand the working voltage of the entire circuit, the isolation resistance between those components and the electrical chassis can be measured separately by applying at least half of their own working voltage with those components disconnected.

  • Deployment Method You may only install the Products on servers and workstations under the control of your third-party service provider who hosts the Products on your behalf in a public cloud, and will deploy the Products only in the operating environment specified on the order. If the “Cloud Platform for AWS” operating environment is specified on the order, you may deploy the Products listed on the order solely in an Amazon Web Services environment, except for any Products which technically require deployment in a different operating environment. If the “Cloud Platform for Azure” operating environment is specified on the order, you may deploy the Products listed on the order solely in a Microsoft Azure environment, except for any Products which technically require deployment in a different operating environment. 4. 部署方式。您只能在代表您于公共云中托管产品的第三方服务提供商控制的服务器或工作站上安装产品,并且您将只在订单指定的操作环境中部署产品。如果订单上指定了“Cloud Platform for AWS”操作环境,您仅可以在Amazon Web Services 环境中部署订单上所列之产品,因技术要求必须被部署在其他操作环境中的产品除外。 如果订单上指定了“Cloud Platform for Azure”操作环境,则您仅可以在 Microsoft Azure 环境中部署订单上所列之产品,因技术要求必须被部署在其他操作环境中的产品除外。

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

Time is Money Join Law Insider Premium to draft better contracts faster.