Method Description Clause Samples

Method Description. Disposal Disposal is the act of discarding media with no other sanitization considerations. This is most often done by paper recycling containing non-confidential information but may also include other media. Clearing Clearing information is a level of media sanitization that would protect the confidentiality of information against a robust keyboard attack. Simple deletion of items would not suffice for clearing. Clearing must not allow information to be retrieved by data, disk, or file recovery utilities. It must be resistant to keystroke recovery attempts executed from standard input devices and from data scavenging tools. For example, overwriting is an acceptable method for clearing media. The security goal of the overwriting process is to replace written data with random data. Overwriting cannot be used for media that are damaged or not writeable. The media type and size may also influence whether overwriting is a suitable sanitization method. Purging Purging information is a media sanitization process that protects the confidentiality of information against a laboratory attack. For some media, clearing media would not suffice for purging. However, for ATA disk drives manufactured after 2001 (over 15 GB) the terms clearing and purging have converged. Destroying Destruction of media is the ultimate form of sanitization. After media are destroyed, they cannot be reused as originally intended. Physical destruction can be accomplished using a variety of methods, including disintegration, incineration, pulverizing, shredding, and melting. • Disintegration, Incineration, Pulverization, and Melting. These sanitization methods are designed to completely destroy the media. • Shredding. Paper shredders can be used to destroy flexible media such as diskettes once the media are physically removed from their outer containers. The shred size of the refuse should be small enough that there is reasonable assurance in proportion to the data confidentiality level that the information cannot be reconstructed. Optical mass storage media, including compact disks (CD, CD-RW, CD-R, CD-ROM), optical disks (DVD), and magneto-optic (MO) disks must be destroyed by pulverizing, crosscut shredding or burning. Destruction of media should be conducted only by trained and authorized personnel. Safety, hazmat, and special disposition needs should be identified and addressed prior to conducting any media destruction. Paper and microforms [**] [**] [**] Cell Phones [**] [**] [**] Person...
Method Description. GoTo [Void] ([in] StagePosition Makes the holder move to the position given by ‘NewPosition’. NewPosition, ‘AxesBits’ contains information about which axes are to be used to [in] StageAxis AxesBits) perform the movement. This is useful to suppress unnecessary movements of the holder due to fluctuations in position measurement. Also, you do not have to bother to give the correct parameters for axes- settings that you do not want to change. (In Delphi, this function is automatically renamed to GoTo_, because GoTo is a reserved keyword.) GoToWithSpeed [Void] ([in] StagePosition Makes the holder move to the position given by ‘NewPosition’. NewPosition, ‘AxesBits’ contains information about which axes are to be used to [in] StageAxis AxesBits, perform the movement. This is useful to suppress unnecessary [in] Speed Double) movements of the holder due to fluctuations in position measurement. Also, you do not have to bother to give the correct parameters for axes- settings that you do not want to change. (In Delphi, this function is automatically renamed to GoTo_, because GoTo is a reserved keyword.) The speed is a fraction of the standard speed setting (so 1.0 means the standard speed setting). In the Delphi Exampler program the lower limit allowed is 0.1% (but this limit is not in scripting itself). MoveTo ([in] StagePosition NewPosition, [in] StageAxis AxesBits) [Void] Makes the holder move in a way that all possible positions can be reached without touching the objective pole. Actually, the following sequence of movements is performed (a, b denote alpha and beta tilts, x,y,z the x,y and height positions, large letters the new position): b->0, a->0, z->Z, x,y->X,Y, 0->A, 0->B. If ‘AxesBits’ determines that a tilt axis (A or B) is not to be included into the movement, then it will still move, but return to its old setting after X,Y,Z have finished their movement.
Method Description. Key Personnel
Method Description. ForceRefill [Void] Forces a refill of the refrigerant. Notes:
Method Description. OpenFolder This connects to the folder specified by the Folder property. This needs to be called before trying to access any item. GenerateUID This method returns a unique string which can be used for creating new items. You should call this in order to pass to the CreateItem method. CreateItem Creates a new store item in the folder. You need to pass this method a unique string to identify it for operations, and this should be generated by the GenerateUID method. SetProperty This sets properties on the item that has been opened or accessed. The parameters are: SetProperty(ByVal ItemKey As String, ByVal PropName As String, ByVal PropValue As Object, Optional ByVal PropType As Integer = ME_PROPTYPE_DETECT) As Long ItemKey is the UID generated from GenerateUID for new items, or the existing UID for the store item. PropName is the PR string value you are trying to set. These are listed in the MailEnable Store Reference. Examples are PR_MIDDLE_NAME, PR_NICKNAME, etc. Save Saves the store item to disk. CloseFolder This finishes up access to the folder, and saves the index for the folder. This must be called after any OpenFolder. To use the class, you would create a new instance of it, then set the following required properties: Folder Postoffice Mailbox MessageClass Once these are set, you can then use OpenFolder to make a connect to the folder, perform actions, such as CreateItem, SetProperty, and finalise changes with a Save and call CloseFolder to finish with the connection to the folder. An example of creating a contact would be: Dim oStoreItem As New MailEnable.StoreItem Dim ItemID As String oStoreItem.Folder = “\Contacts” oStoreItem.Postoffice = “▇▇▇▇▇▇▇.▇▇▇” oStoreItem.Mailbox = “▇▇▇▇” oStoreItem.MessageClass = ▇▇▇▇▇▇▇▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇_MSG_CLASS_CONTACT if (oStoreItem.OpenFolder() <> 0) ItemID = oStoreItem.GenerateUID() oStoreItem.CreateItem(ItemID) oStoreItem.SetProperty(ItemID, “ME_ITEM_ID”, ItemID) oStoreItem.SetProperty(ItemID, "PR_GIVEN_NAME", "▇▇▇▇▇▇▇") oStoreItem.SetProperty(ItemID, "PR_MIDDLE_NAME", "▇▇▇▇▇▇▇▇▇▇") oStoreItem.SetProperty(ItemID, "PR_SURNAME", "▇▇▇▇▇▇") oStoreItem.SetProperty(ItemID, "PR_DISPLAY_NAME", "▇▇▇▇ ▇ ▇▇▇▇▇▇") ▇▇▇▇▇▇▇▇▇▇.▇▇▇▇() oStoreItem.CloseFolder() End If
Method Description delete This method automatically deletes a cell or the range of cells. delete(DeleteShiftDirection.Left) This method deletes the range of cells and moves the existing range of cells to the left. delete(DeleteShiftDirection.Up) This method delete the range of cells and move the existing range of cells in upward direction. In order to delete a single cell or a cell range in a worksheet, refer to the following example code. // Delete the range of cell worksheet.getRange("A3").delete(); // Delete the range of cells worksheet.getRange("A3:C10").delete(); In order to delete a single cell or a range of cells in a worksheet while specifying the desired shift direction for the existing cells, refer to the following example code. // Delete the range of cells from desired direction worksheet.getRange("A3:C10").delete(DeleteShiftDirection.Left); worksheet.getRange("A3:C10").delete(DeleteShiftDirection.Up); GcExcel Java provides you with the ability to insert or delete rows and columns in a worksheet. GcExcel Java allow you to add rows or columns in a worksheet by calling the insert ('insert Method' in the on-line documentation) method of the IRange ('IRange Interface' in the on-line documentation) interface. When rows are added, the existing rows in the worksheet are shifted in downward direction whereas when columns are added, the existing columns in the worksheet are shifted to the right. You can also use the getEntireRow ('getEntireRow Method' in the on-line documentation) method to insert rows in a worksheet which includes all the columns. While inserting rows using the getEntireRow method, there is no need to provide the shift direction in the function parameters. If you provide the same, it will be ignored. In order to insert rows in a worksheet, refer to the following example code. // Insert rows worksheet.getRange("A3:A5").getEntireRow().insert(); // OR worksheet.getRange("3:5").insert();‌ You can also use the getEntireColumn ('getEntireColumn Method' in the on-line documentation) method to insert columns in the worksheet which includes all rows. While inserting columns using the EntireColumn method, there is no need to provide the shift direction in the function parameters. If you provide the same, it will be ignored. In order to insert columns in a worksheet, refer to the following example code. // Insert columns worksheet.getRange("A3:A5").getEntireColumn().insert(); // OR worksheet.getRange("3:5").insert(); GcExcel Java allows you to delete rows or columns ...
Method Description. Our method estimates the capable workload. Over esti- mation may lead to under provisioning, which means high probability of SLA violation. Under estimation leads to over provisioning, which means unnecessary cost. From the PaaS provider’s perspective, low level under estimation is inevitable for signing a contract. In this part, our SLA feasibility study method will be introduced according to the steps. For each step, we will formally describe our method and corresponding examples. 1: function SELFBENCH BCF( ORAS(FLAVOR), ORAS(MIN NoI)) 2: SelfBench(S gnrl(MIN NoI),S gnrl(MIN NoI),S gnrl(MIN NoI)) 3: for each TIER do 4: CPU RAM RATIO = Avg CPU UTIL/Avg RAM UTIL 5: if CPU RAM RATIO 1.5 then 6: BCF(TIER)=X cpu 7: else if CPU RAM RATIO 0.5 then 8: BCF(TIER)=X ram 9: else 10: BCF(TIER)=X gnrl 11: end if 12: end for 13: return BCF(TIER) for each tier 14: end function 1: function FIND ORAS MAXTH( MIN NoI, MAXTH, BCF(TIER), FLAVOR) 2: ORAS(MAXTH) = NULL 3: repeat
Method Description. Normalize [Void] ([in] Normalizes the condenser lenses and/or the minicondenser lens, IlluminationNormalization dependent on the choice of ‘Norm’. Norm)

Related to Method Description

  • ITEM DESCRIPTION Equipment (include VIN, make, model, year, serial no., accessories, or other identifying features): 12. NO. OF OPERATORS PER SHIFT 13. HRLY/ DAILY/ MILEAGE SHIFT BASIS 14. SPECIAL 15. GUARANTEE (8 HOURS) Portable Toilet Rental – Serviced(Includes first day delivery/last day pickup and daily rental rate per unit) 1 $75 Daily Ea. Portable Toilet Rental – Unserviced(Rental only, no daily service call) 1 $45 Daily Ea. Accessible Portable Toilet Rental – Serviced(Includes first day delivery/last day pickup and daily rental rate per unit) 1 $95 Daily Ea. Accessible Portable Toilet Rental – Unserviced(Rental only, no daily service call) 1 $65 Daily Ea.

  • System Description The wet detention basin is designed to trap 80% of sediment in runoff and maintain pre-development downstream peak flows. The basin has two forebays (smaller ponds) located at the low end of two grass ▇▇▇▇▇▇. In addition to runoff conveyance, the grass ▇▇▇▇▇▇ also allow infiltration and filtering of pollutants, especially from smaller storms. The forebays are each 4 feet deep. They are connected to the main pool by 18 and 24-inch metal pipes that outlet onto a rock chute. The forebays will trap coarse sediments in runoff, such as road sands, thus reducing maintenance of the main basin. The main pool will trap the finer suspended sediment. To do this, the pond size, water level and outlet structures must be maintained as specified in this Agreement (see Figures 1, 2 and 3). The main basin receives runoff from a 67.1 acre drainage area (41.2 acres within the subdivision and 25.9 acres off- site drainage coming from the east). During high rainfall or snow melt events, the water level will temporarily rise and slowly drain down to the elevation of the control structure. The water level is controlled by a 12-inch concrete pipe extending through the berm in the northwest corner of the basin (see Figures 1 and 3). On the face of the 12- inch pipe, there is metal plate with a 3-inch drilled hole (orifice) with stone in front of it. This orifice controls the water level and causes the pond to temporarily rise during runoff events. Washed stone (1-2” diameter) is placed in front of the orifice to prevent clogging. High flows may enter the grated concrete riser or flow over the rock lined emergency spillway. “As-built” construction drawings of the basin, showing actual dimensions, elevations, outlet structures, etc. will be recorded as an addendum(s) to this agreement within 60 days after Waukesha County accepts verification of construction from the project engineer.

  • Project Description In two or three brief sentences, provide a concise description of your exhibition. Include the subject matter, type of objects to be included (paintings, sculpture, manuscripts, etc.), those responsible for organizing the exhibition, and catalogue author(s).

  • Task Description This task includes activities associated with permit-required monitoring conducted in accordance with the conditions specified by state or federal regulatory agencies. All monitoring tasks must be located within or adjacent to the Project area and follow the Department’s Regional Coastal Monitoring Program and FWC's marine turtle and shorebird monitoring programs. Guidance for monitoring of nearshore resources is available in the Department's Standard Operation Procedures For Nearshore Hardbottom Monitoring Of Beach Nourishment Projects. The Local Sponsor must submit work products directly to the appropriate state or federal regulatory agencies in accordance with permit conditions to be eligible for reimbursement under this task, unless otherwise directed.

  • Investment Description Each Fund will invest and reinvest its assets in accordance with the investment objective(s), policies and limitations specified in the prospectus (the “Prospectus”) relating to such Fund filed with the Securities and Exchange Commission (the “SEC”) as part of the Fund’s Registration Statement on Form N-1A, as it may be periodically amended or supplemented and in accordance with exemptive orders and no-action letters issued to the Trust by the SEC and its staff.