Machine Operator (B) Sample Clauses

Machine Operator (B). An employee who generally operates, maintains, and repairs roadway equipment or roadway machinery that is not defined in the work category of Machine Operator (A), either independently or as part of a large or small crew or team (gang), and who may perform any other work for which qualified.

Related to Machine Operator (B)

  • Operator The Optionee shall be the operator for purposes of developing and executing exploration programs.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Operator Services Operator Services consist of the following services. (a) Calling card - the Customer dials 0+ or 0 - and provides operator with calling card number for billing purposes. (b) Collect - the Customer dials 0+ or 0 - and asks the operator to bill the call to the called number, provided such billing is accepted by the called number. (c) Third number billed - the Customer dials 0+ or 0- and asks the operator to bill the call to a different number than the calling or called number. (d) Operator assistance - providing local and intraLATA operator assistance for the purposes of: (1) assisting Customers requesting help in completing calls or requesting information on how to place calls; (2) handling emergency calls; (3) handling person-to-person calls. (e) Operator Transfer Service (“OTS”) - calls in which the Customer dials “0”, is connected to an SBC ILLINOIS operator and then requests call routing to an IXC subscribing to OTS. The operator will key the IXC’s digit carrier identification code to route the Customer to the requested IXC’s point of termination. (f) BLV - Service in which operator verifies a busy condition on a line. (g) BLVI - service in which operator, after verifying a busy line, interrupts the call in progress.

  • Television Equipment Recycling Program If this Contract is for the purchase or lease of covered television equipment, then Contractor certifies that it is compliance with Subchapter Z, Chapter 361 of the Texas Health and Safety Code related to the Television Equipment Recycling Program.

  • One-Way Interconnection Trunks 2.3.1 Where the Parties use One-Way Interconnection Trunks for the delivery of traffic from Onvoy to Frontier, Onvoy, at Onvoy’s own expense, shall: 2.3.1.1 provide its own facilities for delivery of the traffic to the technically feasible Point(s) of Interconnection on Frontier’s network in a LATA; and/or 2.3.1.2 obtain transport for delivery of the traffic to the technically feasible Point(s) of Interconnection on Frontier’s network in a LATA (a) from a third party, or, (b) if Frontier offers such transport pursuant to a Frontier access Tariff, from Frontier. 2.3.2 For each Tandem or End Office One-Way Interconnection Trunk group for delivery of traffic from Onvoy to Frontier with a utilization level of less than sixty percent (60%) for final trunk groups and eighty-five percent (85%) for high usage trunk groups, unless the Parties agree otherwise, Onvoy will promptly submit ASRs to disconnect a sufficient number of Interconnection Trunks to attain a utilization level of approximately sixty percent (60%) for all final trunk groups and eighty-five percent (85%) for all high usage trunk groups. In the event Onvoy fails to submit an ASR to disconnect One-Way Interconnection Trunks as required by this Section, Frontier may disconnect the excess Interconnection Trunks or bill (and Onvoy shall pay) for the excess Interconnection Trunks at the rates set forth in the Pricing Attachment. 2.3.3 Where the Parties use One-Way Interconnection Trunks for the delivery of traffic from Frontier to Onvoy, Frontier, at Frontier’s own expense, shall provide its own facilities for delivery of the traffic to the technically feasible Point(s) of Interconnection on Frontier’s network in a LATA.

  • Rent Rolls; Operating Histories The Seller has obtained a rent roll (the “Certified Rent Roll(s)”) other than with respect to hospitality properties certified by the related Mortgagor or the related guarantor(s) as accurate and complete in all material respects as of a date within 180 days of the date of origination of the related Mortgage Loan. The Seller has obtained operating histories (the “Certified Operating Histories”) with respect to each Mortgaged Property certified by the related Mortgagor or the related guarantor(s) as accurate and complete in all material respects as of a date within 180 days of the date of origination of the related Mortgage Loan. The Certified Operating Histories collectively report on operations for a period equal to (a) at least a continuous three-year period or (b) in the event the Mortgaged Property was owned, operated or constructed by the Mortgagor or an affiliate for less than three years then for such shorter period of time, it being understood that for mortgaged properties acquired with the proceeds of a Mortgage Loan, Certified Operating Histories may not have been available.

  • Safe Operations Notwithstanding any other provision of this Agreement, an NTO may take, or cause to be taken, such action with respect to the operation of its facilities as it deems necessary to maintain Safe Operations. To ensure Safe Operations, the local operating rules of the ITO(s) shall govern the connection and disconnection of generation with NTO transmission facilities. Safe Operations include the application and enforcement of rules, procedures and protocols that are intended to ensure the safety of personnel operating or performing work or tests on transmission facilities.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.