Intelligent Device Monitoring Sample Clauses

Intelligent Device Monitoring. Intelligent Device Monitoring (IDM) is Ricoh's technology-enabled process for the management of remote, networked print devices, including: device administration and reporting; supply and service management; meter collection; and, control utilization.
AutoNDA by SimpleDocs
Intelligent Device Monitoring. Intelligent Device Monitoring is Ricoh’s technology-enabled process for the management of remote, networked print devices, including: device administration and reporting; supply and service management; meter collection; and, control utilization. @Remote Enterprise Pro. @Remote Enterprise Pro is a locally-installed server-based software for monitoring and managing networked Ricoh manufactured Covered Equipment. @Remote Enterprise Pro may allow Ricoh to remotely collect meter reads, install print drivers, and receive real-time Ricoh manufactured Covered Equipment status including paper, toner, configuration and early warnings such as “Low Toner” or “Almost out of Paper” and to automatically direct those alerts to personnel, depending on what options are selected by Ricoh and Customer. Customer must comply with the @Remote Enterprise Pro license agreement that ships with the product. Equipment Asset Management. Ricoh will perform an initial equipment inventory of all Customer equipment to determine what equipment is covered by the Service Order and will update the applicable Appendix to the Service Order to reflect any additional equipment located during such inventory. Any equipment located during such inventory will be Covered Equipment under the Service Order, except as expressly set forth in writing by Customer. After the initial equipment inventory, Ricoh will continue to maintain and update the applicable asset management database to include the asset tag and agreed upon equipment information (including model, serial number and equipment location) for all Covered Equipment.

Related to Intelligent Device Monitoring

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • System Monitoring to ensure safe and continuous operation, the Customer must monitor key services and resource use as recommended by Deswik, and provide Deswik with details of monitoring and any relevant alerts as needed. Services to be monitors include, without limitation, disk space, CPU usage, memory usage, database connectivity, and network utilization.

  • Compliance Monitoring Grantee must be subject to compliance monitoring during the period of performance in which funds are Expended and up to three years following the closeout of all funds. In order to assure that the program can be adequately monitored, the following is required of Grantee:

  • Evaluation, Testing, and Monitoring 1. The System Agency may review, test, evaluate and monitor Grantee’s Products and services, as well as associated documentation and technical support for compliance with the Accessibility Standards. Review, testing, evaluation and monitoring may be conducted before and after the award of a contract. Testing and monitoring may include user acceptance testing. Neither the review, testing (including acceptance testing), evaluation or monitoring of any Product or service, nor the absence of review, testing, evaluation or monitoring, will result in a waiver of the State’s right to contest the Grantee’s assertion of compliance with the Accessibility Standards.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!