New Interfaces Sample Clauses

New Interfaces. Envestnet will build interfaces to clearing and custody systems for which FundQuest currently has an interface and Envestnet does not.
AutoNDA by SimpleDocs
New Interfaces. Advances in interface technology are creating new opportunities for better assistive technologies, more accessible mainstream technologies, and entirely new concepts for controlling both. Using a projector and camera, keyboards, displays and control panels can be projected onto a table top, a wall or any other flat surface. When people touch the “buttons” in such an image, the camera tracks movements, and the buttons or keys operate as if they really existed. Alternatively, it has been demonstrated that it is possible to project an image which floats in space in front of a person and is seen only the person using glasses or goggle-based system. It is also possible to project the image directly onto the retina. A gesture recognition system can be used to operate the controls that float along the display. Motion sensors can cause the displays to move with the user's head, or stay stationary. It is also possible to project images to overlay them with what a person is seeing in reality, to create an “augmented reality.” For example, a traveller, moving in a city in a foreign country, by wearing a pair of glasses could see a translation of a street sign (in her/his native language) projected over the top of the sign. Finally, research is taking place on ultra-high resolution displays with a target of being able to display images that appear with the same fidelity as reality (virtual reality). Introducing three-dimensional viewing and displays that work in 360 degrees, researchers have a goal of eventually creating walls or environments that are indistinguishable from reality. Voice technology is developing hands-free operation and voice control. There are already hands-free telephones. New phase-array microphones have been developed that can pick up a single person’s voice and cancel out surrounding sounds, allowing communication and voice control in noisy environments. There are cameras that can self-adjust to track a user's face, allowing face-to face communication for those who cannot reach out to adjust cameras. Rudimentary speech recognition is available on a $3 chip and speech recognition within a limited topic domain is commonly used. IBM has a “superhuman speech recognition project, the goal of which is to create technology that can recognize speech better than humans can (Xxxxxx-Xxxxx, 2002). The cost to build speech output into products has reduced to the point where speech can be provided on almost anything. Operating systems today have free speech s...

Related to New Interfaces

  • Interfaces GTE provides the CLECs with choices for access to OSS pre-ordering, ordering, maintenance and repair systems. Availability of the interfaces is fundamental to the CLEC being able to effectively do business with GTE. Additionally, in many instances, CLEC personnel must work with the service personnel of GTE. Measurements in this category assess the availability to the CLECs of systems and personnel at GTE work centers.

  • Interface A defined set of transmission facilities that separate Load Zones and that separate the NYCA from adjacent Control Areas. Investor-Owned Transmission Owners. A Transmission Owner that is owned by private investors. At the present time these include: Central Xxxxxx Gas & Electric Corporation, Consolidated Edison Company of New York, Inc., New York State Electric & Gas Corporation, Niagara Mohawk Power Corporation, Orange and Rockland Utilities, Inc., and Rochester Gas and Electric Corporation.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Technical Interfaces 3.2.6.1 The Interconnection facilities provided by each Party shall be formatted using either Alternate Xxxx Inversion (AMI) line code with Superframe format framing or Bipolar 8-Zero Substitution with Extended Superframe (B8ZS ESF) format framing or any mutually agreeable line coding and framing.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Network Interface Device 4.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s on-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable. 4.1.1 BellSouth shall permit Al-Call to connect Al-Call ’s loop facilities to on-premises wiring through the BellSouth NID or at any other technically feasible point.

  • Functionality Customer is entitled to additional functionality previously purchased or bundled with the software if available in the version or update released on or after the start date of the Agreement. Customer acknowledges that certain functionality in current and previous software versions may not be available in future upgrades. Added functionality may require additional paid services (clinical and technical) to configure and support.

  • Methods of Interconnection The Parties will negotiate the facilities arrangement used to interconnect their respective networks. CLEC shall establish at least one (1) physical Point of Interconnection in CenturyLink territory in each LATA CLEC has local End User Customers. CLEC represents and warrants that it is serving End User Customers physically located within each local calling area for which it wishes to exchange traffic within CenturyLink territory. The Parties shall establish, through negotiations, at least one (1) of the following Interconnection arrangements, at any Technically Feasible point: (1) a DS1 or DS3 CenturyLink-provided facility; (2) Collocation; (3) negotiated Mid-Span Meet POI facilities; or (4) other Technically Feasible methods of Interconnection via the Bona Fide Request (BFR) process unless a particular arrangement has been previously provided to a third party, or is offered by CenturyLink as a product. 7.1.2.1 CenturyLink-provided Facility. Interconnection may be accomplished through the provision of a DS1 or DS3 Entrance Facility of CLEC's determination. An Entrance Facility extends from the CenturyLink Serving Wire Center to CLEC's Switch location or any Technically Feasible POI chosen by CLEC. CenturyLink-provided Entrance Facilities may not extend beyond the area served by the CenturyLink Serving Wire Center. The rates for CenturyLink-provided Entrance Facilities are provided in Exhibit A. CenturyLink's private line transport service is available as an alternative to CenturyLink-provided Entrance Facilities, when CLEC uses such private line transport service for multiple services. Entrance Facilities may not be used for Interconnection with Unbundled Network Elements. 7.1.2.2 Collocation. Interconnection may be accomplished through the Collocation arrangements offered by CenturyLink. The terms and conditions under which Collocation will be available are described in Section 8 of this Agreement. 7.1.2.2.1 Expanded Interconnection Channel Termination (EICT) provides the communication path that actually connects the physical space or in the case of virtual collocation, the designated equipment to CenturyLink's direct trunked transport and must be ordered to provision LIS to a collocation. 7.1.2.3 Mid-Span Meet POI. A Mid-Span Meet POI is a negotiated Point of Interface, limited to the Interconnection of facilities between the CenturyLink Serving Wire Center location and the location of the CLEC switch or other equipment located within the area served by the CenturyLink Serving Wire Center. The actual physical Point of Interface and facilities used will be subject to negotiations between the Parties. Each Party will be responsible for its portion of the build to the Mid-Span Meet POI. The Mid-Span Meet POI will be used exclusively as an Interconnection facility and cannot be used for other purposes such as Unbundled Network Elements or Access Services.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!