Network Applications Sample Clauses

Network Applications. The COSIGN control plane architecture described here follows the SDN principle of keeping the SDN controller itself as a generalized container of basic network functions which aim to provide deep programmability of optical resources in the DCN for SDN applications and services running above the controller. The core network functions presented above provides all the tools and the primitives, i.e. through the A-CPI, to manage, control and operate the COSIGN optical DCN in a programmable and flexible way. A set of SDN applications are implemented over the COSIGN SDN controller, both at the COSIGN Control Plane (WP3) and at the cloud orchestrator level (WP4). These applications cover more complex control procedures, often involving also IT resources (e.g. joint provisioning of virtual network and IT infrastructures at the cloud orchestrator), or management functions that are needed to match the global COSIGN requirements. Example of these applications include the overlay-based network and service virtualization, the orchestration of cloud services (WP4) and management functions like policy configuration, accounting and billing, authentication and authorization or SLA management (see Table 4). Table 4 – SDN applications in COSIGN architecture SDN application Description Overlay-based service virtualization This is a key SDN application in the COSIGN architecture and it implements the highest level of network virtualization following the overlay-based model with traffic encapsulated at the end points and tunneled across the DCN. In particular, it does not need to have a direct view of the DCN topology and capabilities, but it can just rely on the abstract connection services provided by the infrastructure control layer, i.e. by the SDN controller A-CPI APIs. This approach simplifies the service virtualization approach, since it operates just at the network edges. On the other hand, the cooperation with the infrastructure control functions introduces a certain degree of awareness and mutual adaptation between the two layers, with the possibility to overcome the limitations of the pure overlay-based approach. For example, bandwidth constraints between two end points can be guaranteed through the proper configuration of optical connection paths at the infrastructure control layer, upon specific request of the service virtualization layer. Connection recovery can be also managed in a transparent and policy-driven way at the infrastructure control layer inside the SD...
AutoNDA by SimpleDocs
Network Applications. The Contractor shall be committed to providing publication-quality word processing and document management based primarily on a Microsoft Office environment (Word, Excel, and PowerPoint) and custom DMIS publication system. Client/server POP, IMAP, and MS Exchange services are provided. Outlook, Thunderbird, Apple Mail and Outlook web Access clients are used. The Contractor shall be responsible for implementing and maintaining e-mail service environments, and for the system-wide management of the SSD e-mail software. The Contractor shall also provide technical assistance and training in the use of all SSD network applications and resources in accordance with Technical Direction from the COR.
Network Applications. Descriptions of the domain name, mail, news services, and other network applications available in connection with the Service, and the pricing and additional terms applicable thereto, are set forth in the Network Applications Fee Schedule available at xxxx://xxx.xxx.xxx/uunet/terms/netapps/us/ (or other URL designated by UUNET). UUNET reserves the right to change the Network Applications Fee Schedule from time to time effective upon posting of the changes to the applicable URL or other notice to Customer.
Network Applications. The Provider maintain and manage the following network applications as part of this SLA. This includes all security related patches and any appropriate performance and stability patches (where recommended by the Provider). Software Name Vendor Abacus Servelec Social Care Ltd Autocad Cadline/Trustmarque Chipside(Parking) Chipside Limited Clearskies(Crematorium Software) Clearskies Software CPD Online The Provider Limited Crystal Reports Trustmarque Dragon Trustmarque Ferret Maximiser & Minimiser Ferret Information Systems Ltd Halrose - EROS \ Avantguard Halrose HBSMR Exegesis SDM Limited IDOX IDOX IKEN Iken Business Limited JAWS Sight & Sound Technology Micromusee Mobydoc Software Name Vendor Xxxxxx.XXX Modern Mindset Limited NBS Scheduler/Building Riba Enterprises Limited Netloan Lorensbergs Limited Xxxxxx Net 2 Sentinel Security Systems/Digital ID Limited Xxxx.Xxx(Capita Chip & Pin) Capita Business Services Limited PCF Secure Printing PCF Print Management Limited SNAP Snap Surveys Talis Talis Information Limited Workstation Booking - Netloan Lorensbergs Limited IRIS - Coroners Software IRIS Group Limited OmniBus \ OmniTime \ OmniMaps \ OmniFlag \ OmniStop Omnibus Solutions Limited Draftsight Solid Applications Limited Clicker Xxxxx Software Limited Egress Primosec Limited Read And Write Trustmarque Rio Servelec Sentinel Sentinel Security Systems Tinytag Gemini Data Loggers (UK) Limited ZoomText Trustmarque Solutions Limited Table 5 Supported Network Applications

Related to Network Applications

  • General Application The rules set forth below in this Article 5 shall apply for the purposes of determining each Member’s allocable share of the items of income, gain, loss and expense of the Company comprising Net Income or Net Loss for each Allocation Year, determining special allocations of other items of income, gain, loss and expense, and adjusting the balance of each Member’s Capital Account to reflect the aforementioned general and special allocations. For each Allocation Year, the special allocations in Section 5.4 shall be made immediately prior to the general allocations of Section 5.3.

  • Patent Applications It is understood by the parties that, pursuant to the Baylor Technology Transfer Agreement, MAS has the initial responsibility for filing, prosecution and maintenance of Patents and Patent Applications covering the Baylor Technology. The parties agree that, as between MAS and CTI, MAS shall be responsible for deciding whether and how to file, prosecute and maintain the Patents and Patent Applications, provided that:

  • Applications To the extent that any provision of any Application related to any Letter of Credit is inconsistent with the provisions of this Section 3, the provisions of this Section 3 shall apply.

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

  • Listings <<customer_name>> shall provide all new, changed and deleted listings on a timely basis and BellSouth or its agent will include <<customer_name>> residential and business customer listings in the appropriate White Pages (residential and business) or alphabetical directories. Directory listings will make no distinction between <<customer_name>> and BellSouth subscribers.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!