Manipulate and read microscope parameters Sample Clauses

Manipulate and read microscope parameters invoke microscope actions To manipulate microscope parameters, you can in principle use all of the three different ways of writing assignment statements that are already described above (only that for simple properties you do not retrieve interface pointers here). In the following examples, we choose the way of writing that stresses the notion of ‘properties’, because it is the easiest to write and because it is most consistent with the remainder of this help. An example: MyProjection->MagnificationIndex = 5; This statement will set the magnification index to a new value (=5). long MyLong; MyLong = MyProjection->MagnificationIndex; reads the current value of the magnification index into the variable MyLong. ‘Compound’ properties are read and set by using the TEM scripting adapter's ‘utility objects’. Thus IlluminationPtr MyIllumination; VectorPtr MyShift; double MyShiftX; MyIllumination = MyInstrument->Illumination; MyShift = MyIllumination->Shift; MyShiftX = MyShift->X; would read the full 2D-beam shift first and then store its x-component into the variable MyShiftX. Be aware that MyShift contains a copy of the actual beam shift. Thus, if you want to get the new actual beam shift at a later moment in time, you have to ask for MyIllumination->Shift again! Setting compound parameters then works as follows: VectorPtr MyNewShift; MyNewShift = MyIllumination->Shift; MyNewShift->X = 0; MyNewShift->Y = 0; MyIllumination->Shift = MyNewShift; The codes first gets a Vector-object by reading a 2D-property, assigns new values (0,0) and then copies it back, thus setting the beam shift to zero.
AutoNDA by SimpleDocs

Related to Manipulate and read microscope parameters

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Procedures for Providing NP Through Full NXX Code Migration Where a Party has activated an entire NXX for a single Customer, or activated at least eighty percent (80%) of an NXX for a single Customer, with the remaining numbers in that NXX either reserved for future use by that Customer or otherwise unused, if such Customer chooses to receive Telephone Exchange Service from the other Party, the first Party shall cooperate with the second Party to have the entire NXX reassigned in the LERG (and associated industry databases, routing tables, etc.) to an End Office operated by the second Party. Such transfer will be accomplished with appropriate coordination between the Parties and subject to appropriate industry lead times for movements of NXXs from one switch to another. Neither Party shall charge the other in connection with this coordinated transfer.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Unbundled Channelization (Multiplexing) 5.7.1 To the extent NewPhone is purchasing DS1 or DS3 or STS-1 Dedicated Transport pursuant to this Agreement, Unbundled Channelization (UC) provides the optional multiplexing capability that will allow a DS1 (1.544 Mbps) or DS3 (44.736 Mbps) or STS-1 (51.84 Mbps) Network Elements to be multiplexed or channelized at a BellSouth central office. Channelization can be accomplished through the use of a multiplexer or a digital cross-connect system at the discretion of BellSouth. Once UC has been installed, NewPhone may request channel activation on a channelized facility and BellSouth shall connect the requested facilities via COCIs. The COCI must be compatible with the lower capacity facility and ordered with the lower capacity facility. This service is available as defined in NECA 4.

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Anti-Doping I understand and agree that the UCI Anti-Doping Rules and U.S. Anti-Doping Agency (USADA) Protocol apply to me. I agree to submit to drug testing. If it is determined I may have committed an anti-doping rule violation, I agree to submit to the results management authority and processes of USADA or the results management authority of the UCI and my national federation. I agree that arbitration is my exclusive remedy under the above rules.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

Time is Money Join Law Insider Premium to draft better contracts faster.