Protocols – Data Provider Sample Clauses

Protocols – Data Provider. The OnTime data source is the so called Data Provider and, in this case, it is not used the standard events publish/subscribe mechanism. All data requests/responses are synchronous and don’t provide a standard data struc- ture. It depends on the nature of the request/response. When required, the related payload is referred as DataRequestPayload and DataResponsePayload. The complete data requests/responses list is presented in the following table. Data request/response Direction Purpose Type DisruptionsListRequest HMI=>Sys To request the disruptions list to the system (see DisruptionsLis- tResponse) Yes SlowdownsListRequest HMI=>Sys To request the slowdowns list to the system (see SlowdownsLis- tResponse) Yes LinksListRequest HMI=>Sys To request the slowdowns list to the system (see LinksLis- tResponse) Yes ConstraintsListRequest HMI=>Sys To request the slowdowns list to the system (see ConstraintsLis- tResponse) Yes PossibleTrainPathsRequest HMI=>Sys To request a list of possible train path (see PossibleTrainPathsRe- sponse) Next PossibileConflictSolu- tionsRequest HMI=>Sys To request a list of possible con- flict solutions (see PossibileCon- flictSolutionsResponse) Next DisruptionsListResponse Sys=>HMI To send the list of disruptions (see DisruptionsListRequest) Yes SlowdownsListResponse Sys=>HMI To send the list of slowdowns (see SlowdownsListRequest) Yes LinksListResponse Sys=>HMI To send the list of links (see LinksListRequest) Yes ConstraintsListResponse Sys=>HMI To send the list of constraints (see ConstraintsListRequest) Yes PossibleTrainPathsResponse Sys=>HMI To send a list a possible paths for a train (see PossibleTrain- PathsRequest) Next PossibileConflictSolu- tionsResponse Sys=>HMI To send a list of possible conflict solutions (see PossibileConflictSo- lutionsRequest) Next Table 2 - HMI data requests/responses list The meaning of the “type” column is the same of the previous table. Because of the importance of cost functions in the OnTime project, the description of the requests/responses related to them are described in a separate paragraph (3.3.2).
AutoNDA by SimpleDocs

Related to Protocols – Data Provider

  • Details of Data Processing (a) Subject matter: The subject matter of the data processing under this DPA is the Customer Data.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • CONTRACTOR STAFF WITHIN AUTHORIZED USER AGREEMENT The provisions of this section shall apply unless otherwise agreed in the Authorized User Agreement. All employees of the Contractor, or of its Subcontractors, who shall perform under an Authorized User Agreement, shall possess the necessary qualifications, training, licenses, and permits as may be required within the jurisdiction where the Services specified are to be provided or performed, and shall be legally entitled to work in such jurisdiction. All Business Entities that perform Services under the Contract on behalf of Contractor shall, in performing the Services, comply with all applicable Federal, State, and local laws concerning employment in the United States. Staffing Changes within Authorized User Agreement

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: xxxx://xxx.xxxxxx-xxxxx.xxx/508.htm.

  • COVID-19 Protocols Contractor will abide by all applicable COVID-19 protocols set forth in the District’s Reopening and COVID-19 Mitigation Plan and the safety guidelines for COVID-19 prevention established by the California Department of Public Health and the Ventura County Department of Public Health.

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Personal Data, Confidentiality, Recording of Telephone Calls and Records 22.1. The Company may collect client information directly from the Client (in his completed Account Opening Application Form or otherwise) or from other persons including, for example, the credit reference agencies, fraud prevention agencies, banks, other financial institutions, third authentication service providers and the providers of public registers.

Time is Money Join Law Insider Premium to draft better contracts faster.