Network Project Sample Clauses

Network Project. The Agreement for the implementation of the project in South Sudan was signed in February 2012. The project is at an advanced stage of implementation.
AutoNDA by SimpleDocs
Network Project. The Agreement for the implementation of the project in South Sudan was signed in February 2012. The project is at an advanced stage of implementation. India has two battalions of about 2,000 personnel in the UNMISS, deployed in two of the largest states in South Sudan - Jonglei and Upper Nile. Additionally, there is a police component of around 40 Indian Police officers who are assisting the South Sudan National Police Service in building up the police structures, and a number of civilian officials are in various other departments of UNMISS. The Indian army contingents have been undertaking several social welfare initiatives viz. holding medical camps, etc., which have been highly appreciated by the local population. On 09 April 2013, 36 Indian soldiers who were escorting a UN convoy from Pibor to Bor in Jonglei State came under heavy attack from the rebels. One senior Indian Army officer and four soldiers were killed and four Indian soldiers were injured. Seven other civilians from Kenya and South Sudan were also killed in the attack. Two Indian soldiers were killed in an attack on the UN Base at Akobo (Jonglei State) on 19 December 2013. Two Indian soldiers suffered injuries during an attack on the UN Base at Bor, in Jonglei State in April 2014. Presently, there are about 450 Indian nationals in South Sudan. Some of them have set up businesses in Juba and others are working for various companies. A small number of Indian nationals also work in Christian missionary organizations in South Sudan. In addition, as mentioned above, there are 2,000 Indian army peacekeepers, 40 police officers and some civilian officials attached to UNMISS. Indians have been among the first to open hotels, borehole companies, printing press and departmental store in Juba in early 2006. Indian nationals in Juba have formed an Indian Association, whose membership is presently around 250. The Embassy maintains regular contacts with the Indian community in South Sudan and facilitates their various social projects (Last year, a medical camp was organized through participation of doctors from India, for the local South Sudanese community and a blood donation camp was arranged in January 2014).

Related to Network Project

  • Work Progress The Developer and Connecting Transmission Owner will keep each other, and NYISO, advised periodically as to the progress of their respective design, procurement and construction efforts. Any Party may, at any time, request a progress report from the Developer or Connecting Transmission Owner. If, at any time, the Developer determines that the completion of the Connecting Transmission Owner’s Attachment Facilities will not be required until after the specified In-Service Date, the Developer will provide written notice to the Connecting Transmission Owner and NYISO of such later date upon which the completion of the Connecting Transmission Owner’s Attachment Facilities will be required.

  • Project 3.01. The Recipient declares its commitment to the objectives of the Project. To this end, the Recipient shall carry out the Project in accordance with the provisions of Article IV of the General Conditions.

  • Infrastructure Infrastructure serves as the foundation and building blocks of an integrated IT solution. It is the hardware which supports Application Services (C.3.2) and IT Management Services (C.3.3); the software and services which enable that hardware to function; and the hardware, software, and services which allow for secure communication and interoperability between all business and application service components. Infrastructure services facilitate the development and maintenance of critical IT infrastructures required to support Federal government business operations. This section includes the technical framework components that make up integrated IT solutions. One or any combination of these components may be used to deliver IT solutions intended to perform a wide array of functions which allow agencies to deliver services to their customers (or users), whether internal or external, in an efficient and effective manner. Infrastructure includes hardware, software, licensing, technical support, and warranty services from third party sources, as well as technological refreshment and enhancements for that hardware and software. This section is aligned with the FEA/DoDEA Technical Reference Model (TRM) which describes these components using a vocabulary that is common throughout the entire Federal government. A detailed review of the TRM is provided in Section J, Attachment 5. Infrastructure includes complete life cycle support for all hardware, software, and services represented above, including planning, analysis, research and development, design, development, integration and testing, implementation, operations and maintenance, information assurance, and final disposition of these components. The services also include administration and help desk functions necessary to support the IT infrastructure (e.g., desktop support, network administration). Infrastructure components of an integrated IT solution can be categorized as follows:

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Creative Work The Executive agrees that all creative work and work product, including but not limited to all technology, business management tools, processes, software, patents, trademarks, and copyrights developed by the Executive during the term of this Agreement, regardless of when or where such work or work product was produced, constitutes work made for hire, all rights of which are owned by the Employer. The Executive hereby assigns to the Employer all rights, title, and interest, whether by way of copyrights, trade secret, trademark, patent, or otherwise, in all such work or work product, regardless of whether the same is subject to protection by patent, trademark, or copyright laws.

  • Network Maintenance and Management 38.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the government, escalation processes, etc.) to achieve this desired result. 38.2 Each Party will administer its network to ensure acceptable service levels to all users of its network services. Service levels are generally considered acceptable only when End Users are able to establish connections with little or no delay encountered in the network. Each Party will provide a twenty four (24)-hour contact number for Network Traffic Management issues to the other’s surveillance management center. 38.3 Each Party maintains the right to implement protective network traffic management controls, such as “cancel to”, “call gapping” or seven (7)-digit and ten (10)-digit code gaps, to selectively cancel the completion of traffic over its network, including traffic destined for the other Party’s network, when required to protect the public-switched network from congestion as a result of occurrences such as facility failures, switch congestion or failure or focused overload. Each Party shall immediately notify the other Party of any protective control action planned or executed. 38.4 Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes shall not be used to circumvent normal trunk servicing. Expansive controls shall be used only when mutually agreed to by the Parties. 38.5 The Parties shall cooperate and share pre-planning information regarding cross-network call-ins expected to generate large or focused temporary increases in call volumes to prevent or mitigate the impact of these events on the public-switched network, including any disruption or loss of service to the other Party’s End Users. Facsimile (FAX) numbers must be exchanged by the Parties to facilitate event notifications for planned mass calling events. 38.6 Neither Party shall use any Interconnection Service provided under this Agreement or any other service related thereto or used in combination therewith in any manner that interferes with or impairs service over any facilities of AT&T-21STATE, its affiliated companies or other connecting telecommunications carriers, prevents any carrier from using its Telecommunications Service, impairs the quality or the privacy of Telecommunications Service to other carriers or to either Party’s End Users, causes hazards to either Party’s personnel or the public, damage to either Party’s or any connecting carrier’s facilities or equipment, including any malfunction of ordering or billing systems or equipment. Upon such occurrence either Party may discontinue or refuse service, but only for so long as the other Party is violating this provision. Upon any such violation, either Party shall provide the other Party notice of the violation at the earliest practicable time. 38.7 AT&T TENNESSEE hereby commits to provide Disaster Recovery to CLEC according to the plan below. 38.7.1 AT&T TENNESSEE Disaster Recovery Plan 38.7.2 In the unlikely event of a disaster occurring that affects AT&T TENNESSEE’s long-term ability to deliver traffic to a CLEC, general procedures have been developed by AT&T TENNESSEE to hasten the recovery process in accordance with the Telecommunications Service Priority (TSP) Program established by the FCC to identify and prioritize telecommunication services that support national security or emergency preparedness (NS/EP) missions. A description of the TSP Program as it may be amended from time to time is available on AT&T TENNESSEE’s Wholesale – Southeast Region Web site. Since each location is different and could be affected by an assortment of potential problems, a detailed recovery plan is impractical. However, in the process of reviewing recovery activities for specific locations, some basic procedures emerge that appear to be common in most cases. 38.7.3 These general procedures should apply to any disaster that affects the delivery of traffic for an extended time period. Each CLEC will be given the same consideration during an outage, and service will be restored as quickly as possible. AT&T TENNESSEE reserves the right to make changes to these procedures as improvements become available or as business conditions dictate. 38.7.4 This plan will cover the basic recovery procedures that would apply to every CLEC.

  • Work Products Grantee shall provide CalRecycle with copies of all final products identified in the Work Plan. Grantee shall also provide CalRecycle with copies of all public education and advertising material produced pursuant to this Agreement.

  • Projects There shall be a thirty (30) km free zone around the projects excluding the Metro Vancouver Area. For local residents, kilometers shall be paid from the boundary of the free zone around the project. Workers employed by any contractor within an identified free zone who resides outside of that same free zone will be paid according to the Kilometer Chart from the project to their residence less thirty

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Work Product All Work Product shall belong exclusively to the State, with the State having the sole and exclusive right to apply for, obtain, register, hold and renew, in its own name and/or for its own benefit, all patents and copyrights, and all applications and registrations, renewals and continuations thereof and/or any and all other appropriate protection. To the extent exclusive title and/or complete and exclusive ownership rights in and to any Work Product may not originally vest in the State by operation of law or otherwise as contemplated hereunder, Contractor shall immediately upon request, unconditionally and irrevocably assign, transfer and convey to the State all right, title and interest therein.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!