Receive Sample Clauses

Receive. Receive," as it relates to notice to a financial institution, means receipt in the office or branch office of the financial institution in which the account is established or, if the terms of the account require notice at a particular place, in the place required.
AutoNDA by SimpleDocs
Receive accept, expend and disburse funds for purposes consistent with the terms of this Agreement and the duly adopted By-Laws of the Trust.
Receive engineering approval of the project plan;
Receive off-load and provide for safe storage, various component pieces that may arrive at the installation site prior to the commencement of installation.
Receive a Rap Back subscription renewals list from Participants and transmit this information to the FBI;
Receive a wage increase of 5%, this increase to apply as from the first full pay
AutoNDA by SimpleDocs
Receive. 2SM-Receive takes a state σ and a ciphertext c, and outputs a new state σj and a plaintext message m. We assume that 2SM runs on top of the ACB layer, which retransmits any messages that were dropped or tampered with, and authenticates message senders (see Section 5). The 2SM module therefore assumes reliable delivery, and focuses on providing confidentiality with forward secrecy and PCS. The two parties communicating via 2SM can send each other messages in any order, or even concurrently. The Signal protocol is a popular implementation of 2SM, but it does not suffice for our purposes because it heals from a corruption only after several rounds of communication, not with each message sent. On the other hand, several other 2SM protocols proposed in the literature [17, 23, 24, 38] sacrifice efficiency by not assuming authentic message delivery. We instead use a simplified variant of the protocols by Xxxx et al. [24] and Xxxxx and Xxxxxxxx [17]. The specification of our 2SM protocol is given in Figure 2. Our starting point is an IND-CPA-secure public-key encryption scheme PKE = (PKE-Gen, PKE-Enc, PKE-Dec) as defined in Appendix B. Each party updates their public key every time they send a message, which easily provides PCS. To ensure forward secrecy, when one party sends a message, they also generate a new PKE key pair for the other party, include its secret key in the ciphertext, delete their own copy of the secret key, and keep the public key for the next time they send a message. Upon receiving this message, the other party deletes their old secret key and replaces it with the given one. Each of the functions in Figure 2 implicitly takes the current state σ as argument, and returns the updated state σj. 2SM-Send first generates new PKE key pairs for both parties, and stores the secret key for itself at the next unused index in the array σ.mySks. The message m is then encrypted using σ.otherPk, which is either the last public key we generated for the other party, or the last public key we received from the other party, whichever was more recent. σ.otherPkSender is the constant string "me" in the former case, and "other" in the latter case. otherPkSender and otherPkIndex are included in the message as metadata to indicate which of the recipient’s public keys is being used. 2SM-Receive uses the message’s metadata to determine which secret key to use for decryption, as- signing it to sk. In case it is a secret key generated by ourselves, that secret key and al...
Receive. It is often major differences between the return list and the actual container content. The employees must therefore check every item in the returned container and make registrations in the system of each unique serial number. This is a very time consuming part of the process and this activity is one of the reasons why the employees spend over 37 % of their time in the office. A way to make this activity more effective and reduce the time spent in the office is to initiate an investigation to determine whether radio frequent identification (RFID) or similar concepts can be suitable tools to increase efficiency (ref. Smart management TAGHUB, 06.04.2011). Another initiative to improve this situation is to charge the projects of the missing equipment. Economic disadvantages will put a higher pressure on the offshore xxxxxxx to assure correct return shipments.
Receive. Receives a single user screen (See Receiving). To receive an entire group choose scan from the main toolbar (See Scanning). Log Off Logs off a user machine. Reboot Reboots a user machine. Shuts down a user machine. To apply any of the above listed actions to a group, select the appropriate command from the main toolbar. To apply any of the above listed actions to a single user, select the appropriate command from the user's dropdown menu, by right-clicking on that user. Receiving is used to view a single user’s screen. Under the 'General' section of the 'Settings' tab on the main toolbar the resolution and rate can be specified. Only one user can be viewed at a time. To receive a single user, right click on the user and choose 'Receive' The user's screen will appear in a new window on the ScreenWatch™ desktop. Because of the resources required to view a user’s screen, only one user can be viewed at a time. To return to the monitor console, exit the view screen by clicking the close button in the upper right hand corner. While receiving, you may perform the following actions by using the menu at the top: • Clear – returns monitored screen to normal operation • Blank – Blanks currently received screen, and transmits message to user, as entered in “General Settings”. See Section “General Settings”. • Freeze – Xxxxxxx currently received screen, disabling keyboard and mouse, and transmits message to user, as entered in “General Settings”. See Section “General Settings”. • Capture – saves the current screen’s view to the default Capture Directory set in “Scanning Groups>Initiating Scan” Scanning is the group equivalent of receiving. Each user's screen is received for a limited period of time, then the screen switches to the next user in the group according to the scan order. Scanning will continue until stopped by the clicking the close button in the upper right hand corner. Choose 'Scan' from the main toolbar. Set the scan rate, scan resolution and capture path to save screen shots. To view/print captured screenshots, browse to the capture path in Windows Explorer, and open the capture screenshots in your browser or default image viewing application. To arrange the order in which users in the group are scanned, use the buttons to the right of the scan list. Click 'OK' to begin scanning. These settings are saved between scan sessions. Pause Pause on the current screen. The screen will continue to update at the current rate. Resume Resumes scanning after a pause....
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!