RTTP Sample Clauses

RTTP. ‌ While the previous section mainly focused on research in the time-constrained environment, this section covers previous research on the time-relaxed travelling tournament problem. First some move operators that were used in previous research on the RTTP are covered. This is followed by a description of the two algorithms that have provided the best known solutions for the NLx instances.
AutoNDA by SimpleDocs
RTTP. For now, Rttp module is the only in charge of dealing whit this data.

Related to RTTP

  • RTT Round-­‐Trip Time or RTT refers to the time measured from the sending of the first bit of the first packet of the sequence of packets needed to make a request until the reception of the last bit of the last packet of the sequence needed to receive the response. If the client does not receive the whole sequence of packets needed to consider the response as received, the request will be considered unanswered.

  • IBM Credit may in its sole discretion from time to time decide the amount of credit IBM Credit extends to Customer, notwithstanding any prior course of conduct between IBM Credit and Customer. IBM Credit may combine all of its advances to make one debt owed by Customer.

  • Network Interface Device 4.1 The NID is defined as any means of interconnection of end-user customer premises wiring to BellSouth’s distribution plant, such as a cross-connect device used for that purpose. The NID is a single-line termination device or that portion of a multiple-line termination device required to terminate a single line or circuit at the premises. The NID features two independent xxxxxxxx or divisions that separate the service provider’s network from the End User’s on-premises wiring. Each chamber or division contains the appropriate connection points or posts to which the service provider and the End User each make their connections. The NID provides a protective ground connection and is capable of terminating cables such as twisted pair cable. 4.1.1 BellSouth shall permit Al-Call to connect Al-Call ’s loop facilities to on-premises wiring through the BellSouth NID or at any other technically feasible point.

  • STATEWIDE CONTRACT MANAGEMENT SYSTEM If the maximum amount payable to Contractor under this Contract is $100,000 or greater, either on the Effective Date or at any time thereafter, this section shall apply. Contractor agrees to be governed by and comply with the provisions of §§00-000-000, 00-000-000, 00-000-000, and 00- 000-000, C.R.S. regarding the monitoring of vendor performance and the reporting of contract information in the State’s contract management system (“Contract Management System” or “CMS”). Contractor’s performance shall be subject to evaluation and review in accordance with the terms and conditions of this Contract, Colorado statutes governing CMS, and State Fiscal Rules and State Controller policies.

  • Query a search query initiated from the Search Box or a Hyperlink, or a request for Matched Ads initiated by the Ad Code on an Ad Page. Results: Paid Search Results, Hyperlink Results, Domain Match Results, Web Search Results and/or Matched Ads, to the extent included in this Agreement and as appropriate to the context. Search Box: a graphical area in which a user can enter a Query. SO: the Service Order.

  • Cell Phone Employee shall be provided with a cell phone, with e-mail capabilities, at Board expense. As a condition of receipt of said cell phone, employee is expected to be reachable as necessary and appropriate by the Superintendent and Board President for the thorough and efficient operation of the School District. Incidental personal use shall be permitted. Employees shall have the option of being reimbursed for the use of a personal smartphone in the amount of fifty dollars ($50.00) per month instead of accepting a district cell phone. As a condition of this reimbursement, employee must a) be reasonably available at all times via the personal phone; and b) take reasonable measures to protect the confidentiality of student and staff information being transmitted to and through said phone.

  • Data Integrity Policies and procedures to ensure the confidentiality, integrity, and availability of Customer Data or Professional Services Data and protect it from disclosure, improper alteration, or destruction.

  • Data Integrity Control Personal Data will remain intact, complete and current during processing activities.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • DNSSEC Registry Operator shall sign its TLD zone files implementing Domain Name System Security Extensions (“DNSSEC”). During the Term, Registry Operator shall comply with RFCs 4033, 4034, 4035, 4509 and their successors, and follow the best practices described in RFC 4641 and its successors. If Registry Operator implements Hashed Authenticated Denial of Existence for DNS Security Extensions, it shall comply with RFC 5155 and its successors. Registry Operator shall accept public-­‐key material from child domain names in a secure manner according to industry best practices. Registry shall also publish in its website the DNSSEC Practice Statements (DPS) describing critical security controls and procedures for key material storage, access and usage for its own keys and secure acceptance of registrants’ public-­‐key material. Registry Operator shall publish its DPS following the format described in XXX 0000.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!