M16C Devices Sample Clauses

M16C Devices. The user may configure the Cyclone for Renesas to operate on an M16C target by selecting M16C from the Specify Target Architecture drop-down menu. Figure 5-8 shows the M16C specification configuration. The required debug header connections may vary depending on which communication mode is selected. These changes will be reflected in the 14- pin debug header diagram shown on the right-hand side as the user switches between communication modes. Both Clock Synchronous Mode and Clock Asynchronous (UART) Mode are available for all M16C devices. The Cyclone for Renesas will automatically detect the communications speed for Clock Synchronous Mode. For Clock Asynchronous Mode, the user can allow the Cyclone for Renesas to automatically detect the communications speed, or specify a preferred speed. If the specified communication speed does not work, the Cyclone for Renesas will try to automatically detect communication speed again. Figure 5-8: M16C Class Settings
AutoNDA by SimpleDocs

Related to M16C Devices

  • Safety Devices All Products provided under the Contract shall be equipped with required safety devices to comply with all applicable codes, laws, and regulations that are in effect at the time of delivery.

  • Apple and Android Devices The following terms apply when you use a mobile application obtained from either the Apple Store or Google Play (each an “App Distributor”) to access the Site:

  • Protective Devices Protective devices, wearing apparel, and other equipment necessary to protect employees from injury shall be provided by the County in accordance with practices now prevailing or as such practices may be improved from time to time by the County.

  • Mobile Devices Mobile devices which are issued by and belonging to the Contractor for purposes of processing Personal Data should have access control measures and remote wipe capability turned on. Procedures should be in place to report and wipe data off lost mobile devices immediately after detection of loss.

  • Intercept Devices 26.1.1.1 Local and federal law enforcement agencies periodically request information or assistance from local telephone service providers. When either Party receives a request associated with an End User of the other Party, it shall refer such request to the Party that serves such End User, unless the request directs the receiving Party to attach a pen register, trap-and-trace or form of intercept on the Party's facilities, in which case that Party shall comply with any valid request.

  • FABRICATION Making up data or results and recording or reporting them.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • CONTRACTOR PORTABLE DEVICES Contractor shall not place Data on any portable Device unless Device is located and remains within Contractor’s CONUS Data Center. For Authorized Users subject to ITS policies, the Data, and/or the portable device containing the Data, shall be destroyed in accordance with applicable ITS destruction policies (ITS Policy S13-003 Sanitization/Secure Disposal and S14-003 Information Security Controls or successor) when the Contractor is no longer contractually required to store the Data. TRANSFERRING OF DATA General Except as required for reliability, performance, security, or availability of the services, the Contractor will not transfer Data unless directed to do so in writing by the Authorized User. All Data shall remain in CONUS. At the request of the Authorized User, the Contractor will provide the services required to transfer Data from existing Databases to physical storage devices, to facilitate movement of large volumes of Data. The Authorized User may require several Cloud providers to share or transfer Data for a period of time. This will be provided for in the Authorized User Agreement or shall be assumed to be limited to a six month duration. Transfer of Data at End of Contract and/or Authorized User Agreement Term At the end of the Contract and/or Authorized User Agreement term, Contractor may be required to facilitate transfer of Data to a new Contractor. This transfer must be carried out as specified by the Authorized User in the Authorized User Agreement. Transfer of Data; Charges Contractor cannot charge for the transfer of Data unless the charges are provided for in response to an Authorized User RFQ. Transfer of Data; Contract Breach or Termination Notwithstanding Section 3.6.3, in the case of Contract breach or termination for cause of the Contract, all expenses for the transfer of Data shall be the responsibility of the Contractor.

  • Removable media devices All electronic files that contain County PHI or PI data must be encrypted when stored on any removable media or portable device (i.e. USB thumb drives, floppies, CD/DVD, smartphones, backup tapes etc.). Encryption must be a FIPS 140-2 certified algorithm which is 128bit or higher, such as AES.

  • Orthotic Appliances Coverage for Orthotic Appliances is limited to custom-made leg, arm, back and neck braces, when related to a surgical procedure or when used in an attempt to avoid surgery, and is necessary to carry out normal activities of daily living excluding sports activities. Coverage includes the initial purchase, fitting or adjustment. Replacements are covered only when Medically Necessary due to a change in bodily configuration. All other Orthotic Appliances are not covered. The determination of whether a covered item will be paid under the DME, orthotics or prosthetics benefits will be based upon its classification as defined by the Centers for Medicare and Medicaid Services.

Time is Money Join Law Insider Premium to draft better contracts faster.