Semantic Archive Maintenance Sample Clauses

Semantic Archive Maintenance. The WorkbenchUI is a web application accessible with a web browser via the URL xxxx://xxxxxxxxx.xxxxxxx.xx. Workflow 1,2 and 4 are solely running within a web browser. Workflow 3 (Geometric Enrichment) uses the point cloud registration prototype from software deliverable D4.1, which is implemented as a desktop GUI application. This application has to be installed on the stakeholders computer, the process is described in the corresponding section of the user manual. The general user-interaction paradigm for the WorkbenchUI is to first select the desired workflow from the start screen of the application, depicted in Figure 2. The stakeholder is then guided through the individual steps of the workflow. Each step is carried out in a so called page (following the web application terminology). Figure 3 shows the general structure of a page: On top there is a "Next/Previous" button bar that moves the stakeholder from one page to the next or previous one. Below the page title and a description of the current workflow step is given. The bottom most section contains the interactive part of the page and/or displays data. The usage of those parts is the focus of this user manual. Workflow 3 and 4 are special as they provide a selection of tools before starting the user interaction. Depending on the task it is possible that only a single page contributes to a workflow. The remainder of this section goes through the four workflows and describes each con- tributing page. When applicable, the component connected to the GUI page is mentioned so that interested readers have the possibility to get a more technical description of the component in Section 3.2 or dive into the description of the corresponding application programming interface (API) in Appendix 1. Figure 3: Page layout example: (top) Workflow navigation (center) Description of the workflow step (bottom) Area for user-interaction and/or data display
AutoNDA by SimpleDocs

Related to Semantic Archive Maintenance

  • Software Maintenance Subrecipient shall apply security patches and upgrades in a timely manner and keep virus software up-to-date on all systems on which State data may be stored or accessed.

  • System Maintenance The Trust understands that USBFS will perform periodic maintenance to the System(s), which may cause temporary service interruptions. To the extent possible, USBFS shall notify the Trust of all planned outages and will perform any necessary maintenance during non-business hours.

  • Routine Maintenance (i) CRC shall be responsible for Routine Maintenance when necessary or desirable to maintain the Shared Assets in a safe operating condition, and to permit and facilitate (A) the performance by CRC of its obligations pursuant to this Agreement, and (B) the use of Shared Assets by the Operators in accordance with this Agreement. (ii) CSXT or NSR, directly or through their respective affiliates, may perform the work which CRC performed prior to the date of this Agreement when (A) CRC does not possess the skills needed for such work, (B) CRC lacks the necessary employees to do such work in a timely fashion, or (C) CRC does not possess the equipment needed to do such work. CRC and the party performing the work shall agree to a reasonable fee for such work prior to performance. CRC, CSXT and NSR may agree to have additional work performed either by CSXT, NSR or their affiliates.

  • Preventative Maintenance Standards of applicable Professional Governing Body. Anesthesia and surgical equipment maintenance standards as per manufacturer specifications and guidelines, subject to review and acceptance by AHS.

  • Preventive Maintenance The Contractor shall provide necessary preventive maintenance, required testing and inspection, calibration and/or other work necessary to maintain the equipment in complete operational condition during the warranty period.

  • Network Maintenance and Management 38.1 The Parties will work cooperatively to implement this Agreement. The Parties will exchange appropriate information (for example, maintenance contact numbers, network information, information required to comply with law enforcement and other security agencies of the government, escalation processes, etc.) to achieve this desired result. 38.2 Each Party will administer its network to ensure acceptable service levels to all users of its network services. Service levels are generally considered acceptable only when End Users are able to establish connections with little or no delay encountered in the network. Each Party will provide a twenty four (24)-hour contact number for Network Traffic Management issues to the other’s surveillance management center. 38.3 Each Party maintains the right to implement protective network traffic management controls, such as “cancel to”, “call gapping” or seven (7)-digit and ten (10)-digit code gaps, to selectively cancel the completion of traffic over its network, including traffic destined for the other Party’s network, when required to protect the public-switched network from congestion as a result of occurrences such as facility failures, switch congestion or failure or focused overload. Each Party shall immediately notify the other Party of any protective control action planned or executed. 38.4 Where the capability exists, originating or terminating traffic reroutes may be implemented by either Party to temporarily relieve network congestion due to facility failures or abnormal calling patterns. Reroutes shall not be used to circumvent normal trunk servicing. Expansive controls shall be used only when mutually agreed to by the Parties. 38.5 The Parties shall cooperate and share pre-planning information regarding cross-network call-ins expected to generate large or focused temporary increases in call volumes to prevent or mitigate the impact of these events on the public-switched network, including any disruption or loss of service to the other Party’s End Users. Facsimile (FAX) numbers must be exchanged by the Parties to facilitate event notifications for planned mass calling events. 38.6 Neither Party shall use any Interconnection Service provided under this Agreement or any other service related thereto or used in combination therewith in any manner that interferes with or impairs service over any facilities of AT&T-21STATE, its affiliated companies or other connecting telecommunications carriers, prevents any carrier from using its Telecommunications Service, impairs the quality or the privacy of Telecommunications Service to other carriers or to either Party’s End Users, causes hazards to either Party’s personnel or the public, damage to either Party’s or any connecting carrier’s facilities or equipment, including any malfunction of ordering or billing systems or equipment. Upon such occurrence either Party may discontinue or refuse service, but only for so long as the other Party is violating this provision. Upon any such violation, either Party shall provide the other Party notice of the violation at the earliest practicable time. 38.7 AT&T TENNESSEE hereby commits to provide Disaster Recovery to CLEC according to the plan below. 38.7.1 AT&T TENNESSEE Disaster Recovery Plan 38.7.2 In the unlikely event of a disaster occurring that affects AT&T TENNESSEE’s long-term ability to deliver traffic to a CLEC, general procedures have been developed by AT&T TENNESSEE to hasten the recovery process in accordance with the Telecommunications Service Priority (TSP) Program established by the FCC to identify and prioritize telecommunication services that support national security or emergency preparedness (NS/EP) missions. A description of the TSP Program as it may be amended from time to time is available on AT&T TENNESSEE’s Wholesale – Southeast Region Web site. Since each location is different and could be affected by an assortment of potential problems, a detailed recovery plan is impractical. However, in the process of reviewing recovery activities for specific locations, some basic procedures emerge that appear to be common in most cases. 38.7.3 These general procedures should apply to any disaster that affects the delivery of traffic for an extended time period. Each CLEC will be given the same consideration during an outage, and service will be restored as quickly as possible. AT&T TENNESSEE reserves the right to make changes to these procedures as improvements become available or as business conditions dictate. 38.7.4 This plan will cover the basic recovery procedures that would apply to every CLEC.

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Vehicle Maintenance 16.1 You must report to thl as soon as possible, where the oil is above or below the recommended level or the warning indication light is illuminated. 16.2 You must add water/coolant to the cooling system and an appropriate Australian Society of Automotive Engineers rated oil for petrol or diesel powered vehicles (as applicable) to the engine if the indicator level is below minimum. 16.3 You agree to maintain the Vehicle in these conditions and acknowledge that any mechanical damage occasioned as a result of Your failure to maintain the Vehicle in accordance with this clause must be paid by You.

  • Operation and Maintenance Manuals Receipts for transmittal of Operation and Maintenance Manuals, Brochures and Data to the Design Professional (or Commissioning Agent) as required by Section 6.1.1.5.

  • Record Maintenance The Service Provider shall maintain, and require any third parties with which it contracts to maintain with respect to the Fund’s shareholders holding the Fund’s shares in a Service Provider account (“Customers”) the following records: a. Number of shares; b. Date, price and amount of purchases and redemptions (including dividend reinvestments) and dates and amounts of dividends paid for at least the current year to date; c. Name and address of the Customer, including zip codes and social security numbers or taxpayer identification numbers; d. Records of distributions and dividend payments; and e. Any transfers of shares.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!