Microphone Sample Clauses

Microphone. The Kingston Trio will supply TWO of their own condenser microphone(s) for their vocals and instruments; but will require at least one more voice microphone for their bass player. Phantom power is required.
AutoNDA by SimpleDocs
Microphone. Includes a single microphone set up at the front of the Conference Room at the podium. Note that this is separate from sound coming from a computer as part of a presentation.
Microphone. If use of the microphone is needed it must be requested ONE Month prior to the event. Will microphone be needed? Yes No Any additions, modifications or other changes to this agreement must be made on an attached sheet of this agreement and signed by both parties. If the above meets the approval of the Renter, this document must be signed by renter and the Xxxxxxxx Community Center manager to complete the reservation. By signing this agreement I acknowledge that I have read and understand the terms of this agreement and the Renter’s Rules and Responsibilities. This contract is not valid unless signed by both parties In witness whereof, the parties have signed this agreement on of Renter Signature: Phone# Address: Email: Humphrey Community Center Manager Signature:
Microphone. There is a noise cancelling, dynamic microphone in each pilothouse of each ferryboat. The microphones are physically interchangeable.
Microphone. Each copy of Integrated COREL Product shall be distributed by COREL, its Distributors or its OEMs together with a microphone certified by DRAGON for use with the DRAGON Software.
Microphone. The built-in microphone array of the Kinect as well as the Tablet microphone will be used for audio data capturing. Additionally, if the audio quality is not good enough, an additional high quality microphone may be used via an USB connector to the workstation. Miraculous-Life will use the audio data as user input for speech commands as well as deriving the users’ emotional state from it. The Microsoft speech recognition engine will be used for the speech recognition part while Zoobe provides the emotion analysis at their own server infrastructure. Contact sensors will be connected through the XXXXX platform to the Miraculous-Life System. The gathered data will be used as additional input for low level safety services. A bed or pressure sensor will be used to get valuable information about the sleeping and resting behavior of the elderly. This sensor is placed under the mattress and reacts on applied pressure when a person is lying down. This information is further on used by various services as additional input parameter.

Related to Microphone

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Devices BNY Mellon will restrict the transfer of Customer Data from its network to mass storage devices. BNY Mellon will use a mobile device management system or equivalent tool when mobile computing is used to provide the services. Applications on such authenticated devices will be housed within an encrypted container and BNY Mellon will maintain the ability to remote wipe the contents of the container.

  • Smoke Detectors At Owner's expense, smoke detectors will be installed on the Property in working condition in accordance with the law prior to the tenant's occupancy. During the occupancy, it shall be the tenant's responsibility to maintain all smoke detectors. Owner will replace smoke detector equipment as needed.

  • Cell Phones The College follows the State’s Cell Phone Policy. Employees who receive cell phones from the College shall also abide by this Policy. The College shall provide the Policy to any employee who is given a cell phone. Employees are responsible for the cost of all personal calls. While the College anticipates some incidental personal use of cell phones, it is also expected that such use is infrequent.

  • Cell Phone Employee shall be provided with a cell phone, with e-mail capabilities, at Board expense. As a condition of receipt of said cell phone, employee is expected to be reachable as necessary and appropriate by the Superintendent and Board President for the thorough and efficient operation of the School District. Incidental personal use shall be permitted. Employees shall have the option of being reimbursed for the use of a personal smartphone in the amount of fifty dollars ($50.00) per month instead of accepting a district cell phone. As a condition of this reimbursement, employee must a) be reasonably available at all times via the personal phone; and b) take reasonable measures to protect the confidentiality of student and staff information being transmitted to and through said phone.

  • Video This restriction includes, but is not limited to, use of the Beat and/or New Song in television, commercials, film/movies, theatrical works, video games, and in any other form on the Internet which is not expressly permitted herein.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Programming Processor is not responsible for programming or reprogramming of fuel dispensers.

  • Encryption The Fund acknowledges and agrees that encryption may not be available for every communication through the System, or for all data. The Fund agrees that Custodian may deactivate any encryption features at any time, without notice or liability to the Fund, for the purpose of maintaining, repairing or troubleshooting the System or the Software.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!