We use cookies on our site to analyze traffic, enhance your experience, and provide you with tailored content.

For more information visit our privacy policy.

Remote Maintenance Sample Clauses

Remote Maintenance. REMOTE SUPPORT‌ To meet the Remedial Maintenance Response requirements, and perform certain Preventative Maintenance, Contractors may utilize Remote Administration and/or Remote Maintenance/Support Services arrangements. Connections to an Authorized User’s networks/Systems must be performed in a manner prescribed by the Authorized User to preserve the integrity of the Authorized User’s network, confidentiality and integrity of information transmitted over that Authorized User’s network/System, and the availability of the network/System. Furthermore, the Authorized User must specifically grant permission for the Contractor to access the System for each instance of Remote Administration and/or Remote Maintenance/Support Service.
Remote Maintenance. If the Remote Maintenance feature was activated via the remote programming software FSP-5000-RPS data of relevant LSN devices and FPA-5000/FPA-1200 modules are collected and sent either to the Bosch Remote Portal or a central management server system (CMS) over a private secure network where they can be analyzed in order to offer customers preventive services. The Remote Maintenance feature over private secure network is only available in Germany together with a service agreement with ST-IE. With Remote access all maintenance and service functions possible with the Remote Programming Software FSP-5000-RPS can be done from remote (e. g. Remote Terminal, configuration of the panel, trouble shooting). If you enable the Remote Alert service, an FPA-5000/FPA-1200 system pushes relevant status information and events (e.g. alarms or fault messages) to the Bosch Remote Portal. In case of an unexpected event, an alert can e.g. be delivered to a technician in form of SMS or Email (if configured in the Remote Portal) so that relevant actions can be started at once. Additionally to sending notifications, all events exported by the FPA-5000/FPA-1200 network are stored in the Bosch Remote Portal. This accumulated information can be processed and analyzed to detect potential failures in the FPA-5000/FPA-1200 network in advance. In the Remote Services window you find information concerning the features and the status of the Remote Services: – In the start menu, select Diagnostics – Network services – Remote services A list with information concerning the configured feature is displayed whereas RM is short for Remote Maintenance, RA for Remote Alert. Please be aware that it’s necessary to scroll down in the list to see all information: – System name: Name given to the system configuration in FSP-5000-RPS. If no name is configured the serial number of the panel is used as system name. – Remote ID: Identification number for one specific service contractor. The Remote ID is generated and provided by the Remote Portal. To newly enter or change the Remote ID please see Remote Services, page 88. – System ID: identifies one FPA-5000/FPA-1200 system representing one FSP-5000-RPS configuration. It is assigned to the panel by the Remote Portal server. – Status of Remote services: Shows if a remote connection to the Remote Portal server is configured. (Enabled/Disabled). – Connection state: Only available at the panel which is configured as gateway panel. Shows if the connection to t...
Remote Maintenance. During an active subscription the control unit will receive periodic maintenance by remote control over the Internet as needed to ensure that it is healthy and operating correctly.
Remote Maintenance. If the Remote Maintenance feature was activated via the remote programming software FSP-5000-RPS data of relevant LSN devices and FPA-5000/FPA-1200 modules are collected and sent either to the Bosch Remote Portal or a central management server system (CMS) over a private secure network where they can be analyzed in order to offer customers preventive services.
Remote MaintenanceThe Contractor shall provide maintenance as described herein: 1) Full diagnostic access to all major components of the 9-1 -1 CPE System; 2) Capability to disable or enable system ports to bypass failed ports; 3) A list of the most frequently failed components and the success rate of remote reports for these components; 4) Capability to access accumulated statistics on 9-1-1 CPE System performance such as error messages, power failures, etc.; 5) Description of the ability and types of software-that can be remotely updated/replaced; and 6) Confirmation that access to the system will be password protected.
Remote Maintenance a. Upon entering into the Agreement, and in order for HP‟s support specialist to analyse Customer‟s problem, an HP program will collect and transmit information about Customer‟s computer system to HP‟s support specialist, which will include personal data of Customer. The data that is collected is based upon which system and diagnostics Customer chooses. The list below is representative, but not all inclusive, of the types of data collected: 1. Computer and/or printer configuration 2. Printer setup 3. Product and Serial Numbers 4. Hardware diagnostics 5. System device driver versions 6. Microsoft ActiveSync version, installation directory and settings 7. Device manager errors b. During a support call, the HP support specialist may launch the remote desktop sharing function for troubleshooting. In order to enable remote desktop sharing, Customer must have working broadband or alternative internet connection. By entering into this Agreement, Customer agrees to permit HP‟s support specialists to utilise the remote desktop sharing function. The remote desktop sharing function will install some Active X plug-ins into Customer‟s system. Customer acknowledges that Customer has no ownership interest in any diagnostic or other software that may be installed by HP for the provision of the Service under remote maintenance. If any diagnostic or other software is used or provided to Customer in the field of the Service as part of the remote maintenance, Customer will be responsible for configuring the HP Products and non-HP Products to which the Service relates, provided that HP provides Customer with adequate instructions on how to do so. c. All related software and files will be uninstalled automatically when the session is complete or stopped by Customer. d. During remote desktop sharing, the HP‟s support specialist will have access to the Customer‟s system. The HP‟s support specialist will only review the information that is necessary to assist Customer with troubleshooting and will only use the collected information to provide Customer with support under the Service. CUSTOMER SHOULD CLOSE ALL PROGRAMS not related to the issue, Customer should remain at Customer‟s computer during the sharing session to view the agent‟s activities, and Customer may terminate the session at any time by right clicking the Virtual Network Computing („VNC‟) icon in the task tray and selecting Close VNC Server. The HP‟s support specialist will treat the viewed or collected information as ...
Remote Maintenance. 2.35.1. Remote maintenance of critical systems and networks must be restricted to authorised individuals, confined to individual sessions, and subject to review.
Remote Maintenance. Monitoring and maintaining the DOREMI Gateway during the pilot tests requires an open access to the DOREMI Gateway from remote hosts over the Internet. The networking solution sees each DOREMI gateway node connected to a private network installed in the premises of the pilot site apartment. Each node will therefore have a private IP address that makes the host not reachable from other hosts across the Internet. The solution devised for DOREMI consists in the deployment of a Virtual Private network between the DOREMI Gateways and a remote VPN server installed in office premises (AIT). Each DOREMI Gateway will be prepared with certificates and networking configuration prior deployment that forces the setup of the VPN tunnel at system start up, providing a secondary VPN unique IP address to the host. The IP addressing of each host is established before the pilot at node preparation, by linking the certificate released to each gateway to a unique IP address and node hostname. Since the only requirement on the gateway for establishing the VPN tunnel is to have connectivity to the remote VPN server, the DOREMI gateway VPN network will be tested before deployment in pilot sites. 1 xxxx://xxxxx.xxxx.xxx.xx/sensorweaver A dedicated DNS server will also be configured allowing clients to easily identify gateway IP addresses, removing the need of manually mapping IP addresses to gateway hosts. Technical staff clients will be able to access the DOREMI Gateway hosts by first connecting their hosts to the VPN using the same approach followed by gateways. The solution offers several advantages over other approaches, like SSH tunnelling or local network router NAT configuration:  There is no need to configure TCP/UDP port-based rules for IP service access. In case a new service is setup on the gateway, no additional configuration is required in order to allow remote access to the related port.  There is no need to configure additional devices or hosts. The Network Address Translation (NAT) solution, for example, would have required an ad-hoc configuration of each home router, posing burden on the deployment phase. Configuration of the VPN takes place during DOREMI Gateway preparation phase, before deployment in pilot sites.  IP addressing of hosts is decided at pilot preparation time through certificate preparation and VPN server configuration.  DOREMI gateways are accessed regardless of the IP addressing solution adopted in the home LAN (DHCP based or static configura...
Remote MaintenanceOur Software Department is set up to provide remote maintenance work. Machines delivered can be fitted with the required equipment to allow such work.
Remote Maintenance