Managed Server Sample Clauses

Managed Server. A Server is a machine with a Server Operating System that has our remote management & monitoring software (Agent) installed on it or a device that can be remotely connected to through our screen sharing system. Server counts for services are captured once per month and the Server has been turned on at least once that month.
Managed Server. Any variation to the Service Times shall be defined in the Service Order. Response times are a goal and not a guarantee. Incidents reported outside Service Times will be deemed to be received at the start of the next Service Time period. Managed Server covers physical server and virtual server devices only. Devices must be running Microsoft or Enterprise versions of Linux operating system. Support will cover mainstream operating systems that are in support by the manufacturer as well as common Microsoft applications such as Microsoft Exchange Server. Consumption of any Supplier Managed Service may require a Remote Monitoring Agent be installed on devices. It may not be possible to provide this service if the agent is declined, tampered with or removed. This agent will remain the property of the Supplier at all times. Incidents may be logged via email, web portal or telephone or any other method provided by the Supplier during the term of the contract. High priority incidents (P1/P2) must be logged via telephone to ensure the relevant SLA is assigned. Incidents logged via any other means will initially be classified as a P4. After discussing the incident with the Customer, a mutually agreed priority will be assigned to the incident. The Supplier reserves the right to adjust the priority of the incident as it sees fit throughout the duration of the incident. All Managed Server support is remote only. Should the incident not be resolvable remotely, the Supplier will use its reasonable endeavours to provide an engineer on the Customer’s site. If the Customer does not subscribe to an on-site support service via a Service Order, then such site visits may be chargeable. If the incident is as a result of hardware failure, the Supplier will liaise with the hardware manufacturer to provide a repair, provided the Customer has purchased an extended warranty for the hardware. For any device that does not have an extended warranty, the cost of any repair/replacement will be the responsibility of the Customer and the SLA’s will not apply. Incidents will be classified as P4 if hardware cover is not in place. The Supplier will perform automated operating system patching of Microsoft Windows Server devices and Linux Enterprise devices (where possible). Devices must be connected to the Customer’s network to facilitate automated patching. The Customer is responsible for testing of all patches to ensure their compatibility with other Customer software and notify the Supplier p...
Managed Server. The Manager Server consists of the Server and Services provided by MEDecision to support the Product. MEDecision will perform the following tasks: 1. Install and configure hardware, which is procured and paid for by MEDecision unless otherwise specified in an Appendix, Schedule or Exhibit hereto. 2. Integrate hardware into MEDecision monitoring environment- Internet Control Message Protocol (ICMP), CPU, disk, hardware components). 3. Install cables between devices. 4. Provision the infrastructure specific operating systems. 5. Define and configure operating systems monitoring to (1) monitor network connectivity, network devices, or server hardware and (2) gather performance data. 6. Apply required operating system patches or modifications after notifying Customer of such need including the risks of applying, or not applying, patches to the production environment. 7. Test application stability. 8. Create the necessary segregated environments for the Customer to have a test, training and production environment. Segregation will allow for updating of specific environments including layered products. 9. Perform security review prior to system launch which consists of: a. Configurations and settings check during initial server build b. Audit of password integrity 10. Server hardening: a. Install only required operating systems components b. Install MEDecision patches as mutually agreed upon by the parties and as required to maintain compliance with all laws, rules and regulations, including but not limited to any laws, rules and regulations set forth in the Business Associate Agreement executed between MEDecision and Customer. c. Set passwords and access control d. Disable unnecessary network and system services e. Limit network services that run under the root account f. Enable account management and customer access to the maintenance utilities for use in configuring and maintaining the application g. Set up Customer administrator accounts within the application h. Enable read-only access to Cache Database 1. Repair faulty server hardware; if necessary, reinstall and restore the operating systems and associated patches. 2. Apply MEDecision required patches. Certain patches are required to be installed and other patches are installed only if approved by Customer. 3. Operating system security patch management. 4. Monitor relevant vendor and industry bulletins for security-related patch alerts and the other hardware and software components of the system. 5. Evalu...
Managed Server. C2M Managed Server Services provide management of the Server hardware and associated Operating System layer for either a physical or virtual Server provided by C2M. Administrator on a day to day basis until resolution in accordance with the SLA.
Managed Server. ‌ The service agreement contains the following: • Complete management on BSD server • Updates and debugging of minor critical software issues in the period of time between 08.30 am and 04.00 pm Monday to Friday. • Debugging of service-interruptive software issues in the other periods of time.

Related to Managed Server

  • User Generated Content 10.1 As a user to this website, You may be allowed to post any User Generated Content (“User Content”) and You agree, by submitting your contribution, you xxxxx XX Group a perpetual, royalty-free, non-exclusive, sublicensable right and license to use, reproduce, edit, modify, adapt, publish, translate, create derivate works from, distribute, perform, play, make available to the public, and exercise all copyright and publicity rights with respect to your contribution worldwide and/or to incorporate your contribution in other works in any media, now known or later developed, for the full terms of any rights that may exist in your contribution. 10.2 You also hereby grant other user of TM Website a non-exclusive license to access your User Content through the access and/or use of TM Website, and to use such User Content only as permitted through the functionality of TM Website. 10.3 You understand and agree that TM may retain and store, but not display, distribute, or perform, server copies of User Content that has been removed or deleted. The above licenses granted to TM, by You in User Content is irrevocable. 10.4 Further to the foregoing paragraph, by submitting your User Content to us, You warrant that:- (a) your User Content is your own original work or have the necessary license, rights, consents, and permissions to use and authorize us to use all patent, trademark, trade secret, copyright or other proprietary rights in and to any and all User Content to enable TM to use of the User Content in the manner required by us and that you have the right to make it available to us for all the purposes specified above; (b) your User Content is not defamatory, threatening, injurious, insulting character, offensive, abusive, offensive on moral, menacing, religious or political grounds, impair your confidentiality obligations; (c) your User Content does not infringe the law; (d) You shall be solely responsible for your own User Content and the consequences of posting or publishing them; (e) You will not submit material that is copyrighted, protected by trade secret or otherwise subject to third party proprietary rights, including privacy and publicity rights, unless you are the owner of such rights or have permission from their rightful owner to post material and to grant us all of the license rights granted herein; and/or (f) waive any moral rights in your User Content for the purposes of its submission to and publication in TM Website and the purposes specified above. 10.5 You understand that whether or not such User Content is posted, TM does not guarantee any confidentiality with respect to any User Content. TM does not endorse any User Content or any opinion, recommendation, or advice expressed therein, and expressly disclaims any and all liability in connection with User Content. We do not permit activities which will infringe any Intellectual Property Rights including copyright and we will remove all infringing contents and User Content upon notification that such Content or User Content infringes on another’s Intellectual Property Rights. We further reserve the right to remove any Content or User Content without prior notice. 10.6 You understand and agree that we may review and delete any User Content that you posted at any time without notice, without liability and for any reason whatsoever, especially if you breach the terms and conditions herein. 10.7 We reserve the right to investigate and take appropriate legal action, in our sole discretion, against You for the User Content especially if it violates TM policy and report you to the Appropriate Authority.

  • NON-NETWORK PROVIDER is a provider that has not entered into a contract with us or any other Blue Cross and Blue Shield plan. For pediatric dental care services, non-network provider is a dentist that has not entered into a contract with us or does not participate in the Dental Coast to Coast Network. For pediatric vision hardware services, a non-network provider is a provider that has not entered into a contract with EyeMed, our vision care service manager.

  • Network Access During its performance of this Contract, Contractor may be granted access to Purchaser’s computer and telecommunication networks (“Networks”). As a condition of Network use, Contractor shall: (a) use the Networks in compliance with all applicable laws, rules, and regulations; (b) use software, protocols, and procedures as directed by Purchaser to access and use the Networks; (c) only access Network locations made available to Contractor by Purchaser; (d) not interfere with or disrupt other users of the Networks;

  • Host A host where SSH server is activated. A port where SSH server is activated, by default it is 22.

  • Audience Contractor, in collaboration with its subcontractors, shall design, and/or purchase materials and convene a series of training courses that shall serve as a local training resource for group xxxx xxxxx, xxxxxx care providers, and County staff serving Mendocino County’s federally IV-E-eligible children.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If ECI chooses to subtend a Verizon access Tandem, ECI’s NPA/NXX must be assigned by ECI to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 ECI shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from ECI’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office ECI utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow ECI’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Supplier Diversity Seller shall comply with Xxxxx’s Supplier Diversity Program in accordance with Appendix V.

  • Provider Directory a. The Contractor shall make available in electronic form and, upon request, in paper form, the following information about its network providers: i. The provider’s name as well as any group affiliation; ii. Street address(es); iii. Telephone number(s); iv. Website URL, as appropriate; v. Specialty, as appropriate; vi. Whether the provider will accept new beneficiaries; vii. The provider’s cultural and linguistic capabilities, including languages (including American Sign Language) offered by the provider or a skilled medical interpreter at the provider’s office, and whether the provider has completed cultural competence training; and viii. Whether the provider’s office/facility has accommodations for people with physical disabilities, including offices, exam room(s) and equipment. b. The Contractor shall include the following provider types covered under this Agreement in the provider directory: i. Physicians, including specialists ii. Hospitals

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Feedback You have no obligation to provide us with ideas, suggestions, or proposals (“Feedback”). However, if you submit Feedback to us, then you grant us a non-exclusive, worldwide, royalty-free license that is sub-licensable and trans- ferable, to make, use, sell, have made, offer to sell, import, reproduce, publicly display, distribute, modify, or publicly perform the Feedback in any manner without any obligation, royalty, or restriction based on intellectual property rights or otherwise.