Opportunistic Twitter Sample Clauses

Opportunistic Twitter. We are currently developing an opportunistic Twitter client, called Twitteth, for Android that uses broadband access (2G/3G) when available and switches to opportunistic communications when the infrastructure is no longer available. Our objective is to support disaster and emergency situations so that distressed people would still be able to communicate. Extending the reach of Twitter to opportunistic domains highlighted many issues. The main challenge to overcome is to move from a centralized online platform to a distributed opportunistic and delay-tolerant environment especially when the original service has not been thought from a distributed perspective. Figure 5 below shows how the application works in normal and in opportunistic modes. Twitteth accesses user data using OAuth and the API provided by Twitter, after the user grants access by logging in. Twitteth supports most basic Twitter functionality like showing a timeline (i.e., the most recent tweets of the followed users), sending tweets, re-tweeting and replying to and setting favorites, etc. In normal operation, Twitteth queries Twitter servers for new tweets every 2 Minutes. The tweets obtained from the queries are cached locally in a database file. Additionally to normal Twitter client functionality, Twitteth has a setting to enable an opportunistic mode. Upon enabling this mode, the tweets of the user internally are assigned the special status of opportunistic tweets and are stored locally in a separate database for opportunistic spreading and later publication to the Twitter servers. In opportunistic mode, the device periodically scans for reachable Bluetooth devices. For the prototype, we choose a scanning interval of 120 Seconds. The scanning interval presents a tradeoff between energy consumption and delay (as a longer scanning interval misses short connection opportunities). We choose Bluetooth for opportunistic communication, because it is the ad hoc communication technology, which requires the least user interaction with current Android versions. Besides, WiFi ad hoc is still not supported on most popular mobile OSes (Android, iOS). Once two phones are close enough to connect to each other, they exchange their global opportunistic tweets, thereby spreading them epidemically. At the moment, we do not consider any limitations for the epidemic spreading such as hop count or geographic distance. The current version relies on a light version of a opportunistic stack supporting node discove...
AutoNDA by SimpleDocs

Related to Opportunistic Twitter

  • Job Opportunities Section 1: Temporary Assignments Unforeseen circumstances may arise on a shift, which would require an Employee to be temporarily assigned to work other than that he would normally perform. Should such circumstances arise, the Company shall first canvass for volunteers from those employees who are able to perform the work. Should there be more volunteers than are needed, the Company shall assign the work to the volunteer with the highest seniority. Should there be no volunteers; the Company shall assign the work to the lowest seniority employee able to perform the work. Temporary Assignments may be filled according to the process set out in this Article for a period of up to forty-five (45) days. Thereafter, the Temporary Assignment will be posted on a plant wide basis and made available to the most senior employee able to perform the work. In the event that the Temporary Assignment is going to exceed forty-five (45) days, and this fact is known at the time the vacancy first becomes available, the Company will post the Temporary Assignment in accordance with Section 2 at the time the Temporary Assignment first becomes available. If an Employee is temporarily required to fill a higher paid job, the Employee will receive the higher rate of pay for all hours spent performing the job, if he or she performs the job in excess of two (2) hours per shift. If an Employee is temporarily required to fill a lower paid job, his or her rate of pay shall not be reduced. In the event additional temporary assignments are required, the job will be filled in accordance with the process provided above. Subsequent to the completion of a Temporary Assignment, an Employee will be returned to his or her previous position, subject to seniority considerations.

  • Commercial Opportunities 1. The airlines of each Party shall have the right to establish offices in the territory of the other Party for the promotion and sale of air transportation.

  • Training Opportunities The requirements of Section 3 of the Housing and Urban Development Act of 1968, as amended, 12 U.S.C. 1701u ("Section 3"), requiring that to the greatest extent feasible opportunities for training and employment be given to lower income residents of the project area and agreements for work in connection with the project be awarded to business concerns which are located in, or owned in substantial part by persons residing in, the areas of the project. Borrower agrees to include the following language in all subcontracts executed under this Agreement:

  • Promotional Opportunities Each university shall promote upward mobility of employees by announcing opportunities as they occur. In all cases, it is the employee’s responsibility to make proper application for such positions. If an employee meets the minimum and special qualifications for a position, he/she will be considered.

  • Special Situations The parties recognize that under certain circumstances a Change in Control may occur under conditions which make it inappropriate for Employee to receive the termination benefits or protection set forth in this Agreement. Therefore, in the event that a Change in Control occurs for any one of the following reasons, the provisions of Sections 2, 6 and 9 shall not apply:

  • Investment Management If and to the extent requested by the Advisor, the Sub-Advisor shall, subject to the supervision of the Advisor, manage all or a portion of the investments of the Portfolio in accordance with the investment objective, policies and limitations provided in the Portfolio's Prospectus or other governing instruments, as amended from time to time, the Investment Company Act of 1940 (the "1940 Act") and rules thereunder, as amended from time to time, and such other limitations as the Trust or Advisor may impose with respect to the Portfolio by notice to the Sub-Advisor. With respect to the portion of the investments of the Portfolio under its management, the Sub-Advisor is authorized to make investment decisions on behalf of the Portfolio with regard to any stock, bond, other security or investment instrument, and to place orders for the purchase and sale of such securities through such broker-dealers as the Sub-Advisor may select. The Sub-Advisor may also be authorized, but only to the extent such duties are delegated in writing by the Advisor, to provide additional investment management services to the Portfolio, including but not limited to services such as managing foreign currency investments, purchasing and selling or writing futures and options contracts, borrowing money or lending securities on behalf of the Portfolio. All investment management and any other activities of the Sub-Advisor shall at all times be subject to the control and direction of the Advisor and the Trust's Board of Trustees.

  • Asset Management Supplier will: i) maintain an asset inventory of all media and equipment where Accenture Data is stored. Access to such media and equipment will be restricted to authorized Personnel; ii) classify Accenture Data so that it is properly identified and access to it is appropriately restricted; iii) maintain an acceptable use policy with restrictions on printing Accenture Data and procedures for appropriately disposing of printed materials that contain Accenture Data when such data is no longer needed under the Agreement; iv) maintain an appropriate approval process whereby Supplier’s approval is required prior to its Personnel storing Accenture Data on portable devices, remotely accessing Accenture Data, or processing such data outside of Supplier facilities. If remote access is approved, Personnel will use multi-factor authentication, which may include the use of smart cards with certificates, One Time Password (OTP) tokens, and biometrics.

  • Business Opportunities Executive agrees, while he is employed by the Company, to offer or otherwise make known or available to it, as directed by the Board of Directors of the Company and without additional compensation or consideration, any business prospects, contracts or other business opportunities that Executive may discover, find, develop or otherwise have available to Executive in the Company’s general industry and further agrees that any such prospects, contacts or other business opportunities shall be the property of the Company.

  • Selection Planning Prior to the issuance to consultants of any requests for proposals, the proposed plan for the selection of consultants under the Project shall be furnished to the Association for its review and approval, in accordance with the provisions of paragraph 1 of Appendix 1 to the Consultant Guidelines. Selection of all consultants’ services shall be undertaken in accordance with such selection plan as shall have been approved by the Association, and with the provisions of said paragraph 1.

  • Interviewing Opportunity A representative of the Union or Xxxxxxx shall be given an opportunity to interview each new Employee within regular working hours, without loss of pay, for a maximum of thirty (30) minutes during the first month of employment for the purpose of acquainting the new Employee with the benefits and duties of Union membership and its responsibilities and obligations to the Employer and the Union.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!