MAIL USER INTERFACE Sample Clauses

MAIL USER INTERFACE. The management of Mail users will require the use of structure T_MAIL_USER. Although the admin user can be setup and altered by altering the domain information, it is recommended that this channel be used to alter information about admin user as well. This structure will be used for the commands Create, Query and Alter. struct T_MAIL_USER{ struct T_PERL_INTF PerlIntf; BOOL bForwarding; BOOL bAutorespond; char szAutoMessage[256]; char szForwardList[1024]; }; The usage of the fields is as follows. eSERVERTYPE: SERVER_USER_FTP. bFORWARDING: bAUTORESPOND: Enables/Disables auto respond for the given user. szAUTORESPOND: Holds the auto respond message. The value is valid if the field bAutorespond is True, szFORWARDLIST: Holds the forwarding list.
AutoNDA by SimpleDocs

Related to MAIL USER INTERFACE

  • Monthly Data Download Not later than fifteen (15) days after the end of each month, beginning with the month in which the Commencement Date occurs and ending with the Final Shared-Loss Month, Assuming Institution shall provide Receiver:

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Interfaces 1 2 wire i/f (towards PSTN) -------------------------------------------------------------------------------------------------------- 2 2 wire i/f (towards standard handset) -------------------------------------------------------------------------------------------------------- 2.2 FUNCTIONS -------------------------------------------------------------------------------------------------------- 1 Selective Call -------------------------------------------------------------------------------------------------------- 2 Conference Call (up to four participants) ----------------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------- 3 MANAGEMENT COMMUNICATION -------------------------------------------------------------------------------------------------------- 3.1 COMMUNICATION INTERFACES see OPTera Product Description SEC. 5.2.3 - Standard Communications Interfaces and SEC.7.3 - Management Communication -------------------------------------------------------------------------------------------------------- 1 F- Interface (RS 232) -------------------------------------------------------------------------------------------------------- 2 Q- interface as gateway to the EMS -------------------------------------------------------------------------------------------------------- 3 Qecc Routing (2 level IS-IS) -------------------------------------------------------------------------------------------------------- 4 Q I/F (Ethernet) -------------------------------------------------------------------------------------------------------- 5 Optical Supervisory Channel ----------------------------------------------------------------------------------------------------------------------------------- 6 OSC - wavelength IR IR IR see OPTera Product - bitrate Description SEC. 5.2.2 - optical span limit - Per Wavelength - transmission protocol Optical Service Channel and SEC.7.3 - Management Communication ----------------------------------------------------------------------------------------------------------------------------------- ----------------------------------------------------------------------------------------------------------------------------------- 3.2 O & M INTERFACES ----------------------------------------------------------------------------------------------------------------------------------- 1 8 x Remote Control Inputs ----------------------------------------------------------------------------------------------------------------------------------- 2 Remote Control Outputs ----------------------------------------------------------------------------------------------------------------------------------- 3 Card LED support ----------------------------------------------------------------------------------------------------------------------------------- 4 Subrack LED support ----------------------------------------------------------------------------------------------------------------------------------- 5 Rack Alarm support ----------------------------------------------------------------------------------------------------------------------------------- -----------------------------------------------------------------------------------------------------------------------------------

  • User Data “User Data” shall mean any Personal Data or other data or information collected by or on behalf of any Acquired Corporation from users of any Acquired Corporation website.

  • System and Data Access Services a.System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • REMOTE ACCESS SERVICES ADDENDUM The Custodian and each Fund agree to be bound by the terms of the Remote Access Services Addendum hereto.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Database File The Servicer will provide the Successor Servicer with a magnetic tape (in a format reasonably acceptable to the Indenture Trustee and the Servicer) containing the database file for each Contract (i) as of the Initial Cutoff Date, (ii) the Subsequent Cutoff Date, (iii) thereafter, as of the last day of the preceding Due Period on each Determination Date prior to a Service Transfer and (iv) on and as of the Business Day before the actual commencement of servicing functions by the Successor Servicer following the occurrence of a Service Transfer.

  • Data Collection, Processing and Usage The Company collects, processes and uses the International Participant’s personal data, including the International Participant’s name, home address, email address, and telephone number, date of birth, social insurance number or other identification number, salary, citizenship, job title, any shares of Common Stock or directorships held in the Company, and details of all Equity Awards or any other equity compensation awards granted, canceled, exercised, vested, or outstanding in the International Participant’s favor, which the Company receives from the International Participant or the Employer. In granting the Equity Award under the Plan, the Company will collect the International Participant’s personal data for purposes of allocating shares of Common Stock and implementing, administering and managing the Plan. The Company’s legal basis for the collection, processing and usage of the International Participant’s personal data is the International Participant’s consent.

Time is Money Join Law Insider Premium to draft better contracts faster.