Metadata Storage Sample Clauses

Metadata Storage. ‌ Content Item metadata and analysis results will be represented using the RDF model. To simplify working with RDF and provide efficient storage and access, the Persistence API will transparently offer access to OpenRDF Sesame19 repositories to components. Components will be able to request access to any of the RDF metadata and analysis parts of a Content Item. The stack of different APIs offered by Xxxxxx is depicted in Figure 7. The following functionalities will be offered in Java and possibly through REST webservices: • RDF import/export: allows storing and retrieving the RDF data contained in a repository in different serialization formats, e.g. Turtle, RDF/XML, CSV, or JSON-LD • Sesame Repository API: provides Java API-level access to the statements and resources con- tained in the RDF data using the OpenRDF Sesame Repository API (Java only) 19xxxx://xxx.xxxxxxx.xxx/ • SPARQL Query and Update: allows querying and updating RDF data using the SPARQL
AutoNDA by SimpleDocs

Related to Metadata Storage

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • TOOL STORAGE 1. A company shall provide on all construction jobs in towns and cities, and elsewhere where reasonably necessary and practicable (or if requested buy the employee), a suitable and secure waterproof lock-up solely for the purpose of storing employees’ tools, and on multi-storey and major projects the company shall provide, where possible, a suitable lock-up for employees’ tools within a reasonable distance of the work area of large groups of employees.

  • Cloud storage DSHS Confidential Information requires protections equal to or greater than those specified elsewhere within this exhibit. Cloud storage of Data is problematic as neither DSHS nor the Contractor has control of the environment in which the Data is stored. For this reason:

  • Destination CSU-Pueblo scholarship This articulation transfer agreement replaces all previous agreements between CCA and CSU-Pueblo in Bachelor of Science in Physics (Secondary Education Emphasis). This agreement will be reviewed annually and revised (if necessary) as mutually agreed.

  • Cable Television, Telephone & Internet Services Long Distance calling may be done only through the use of a prepaid phone card or by charges made to a third party number if using a provided, in room telephone. Neither the Institution nor the Manager guarantees the availability of telephone service or cable television services. If the Resident wants additional cable television, telephone or internet service above and beyond any that may be provided as “standard” in the Residence, the Resident must submit full details to and request and obtain the prior written approval of the Manager and Institution. With respect to Internet Services, the Institution may at its discretion only allow either the standard provided service or the approved alternate service and not both at the same time (Residents will need to complete the Institution’s standard forms issued by their IT department). Cutting of wiring, boring of holes, the use of wireless routers, routers, or switches are not permitted. Any unauthorized services or equipment may be removed by the Manager, at the Resident’s expense, without notice or liability. All Residents are subject to the Institution’s and/or Service Provider’s current Internet, cable television and telephone enrolment and usage policies.

  • Network Etiquette You are expected to abide by the generally accepted rules of network etiquette. These include but are not limited to the following:

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • WASHINGTON’S ELECTRONIC BUSINESS SOLUTION (WEBS). Contractor represents and warrants that it is registered in Washington’s Electronic Business Solution (WEBS), Washington’s contract registration system and that, all of its information therein is current and accurate and that throughout the term of this Master Contract, Contractor shall maintain an accurate profile in WEBS.

  • Digital Health The HSP agrees to:

Time is Money Join Law Insider Premium to draft better contracts faster.