Small LAN Switch Sample Clauses

Small LAN Switch. Maximum of two ports monitored.
AutoNDA by SimpleDocs

Related to Small LAN Switch

  • Tandem Switching 4.5.1 The Tandem Switching capability Network Element is defined as: (i) trunk-connect facilities, which include, but are not limited to, the connection between trunk termination at a cross-connect panel and switch trunk card; (ii) the basic switch trunk function of connecting trunks to trunks; and (iii) the functions that are centralized in the Tandem Switches (as distinguished from separate end office switches), including but not limited to call recording, the routing of calls to operator services and signaling conversion features. 4.5.2 Where <<customer_short_name>> utilizes portions of the BellSouth network in originating or terminating traffic, the Tandem Switching rates are applied in call scenarios where the Tandem Switching Network Element has been utilized. Because switch recordings cannot accurately indicate on a per call basis when the Tandem Switching Network Element has been utilized for an interoffice call originating from a UNE port and terminating to a BellSouth, Independent Company or Facility-Based CLEC office, BellSouth has developed, based upon call studies, a melded rate that takes into account the average percentage of calls that utilize Tandem Switching in these scenarios. BellSouth shall apply the melded Tandem Switching rate for every call in these scenarios. BellSouth shall utilize the melded Tandem Switching Rate until BellSouth has the capability to measure actual Tandem Switch usage in each call scenario specifically mentioned above, at which point the rate for the actual Tandem Switch usage shall apply. The UNE Local Call Flows set forth on BellSouth's website, as amended from time to time and incorporated herein by this reference, illustrate when the full or melded Tandem Switching rates apply for specific scenarios.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • Local Switching 4.1.1 BellSouth shall provide non-discriminatory access to local circuit switching capability, and local tandem switching capability, on an unbundled basis, except as set forth below in Section 4.1.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • User Generated Content 10.1 As a user to this website, You may be allowed to post any User Generated Content (“User Content”) and You agree, by submitting your contribution, you xxxxx XX Group a perpetual, royalty-free, non-exclusive, sublicensable right and license to use, reproduce, edit, modify, adapt, publish, translate, create derivate works from, distribute, perform, play, make available to the public, and exercise all copyright and publicity rights with respect to your contribution worldwide and/or to incorporate your contribution in other works in any media, now known or later developed, for the full terms of any rights that may exist in your contribution. 10.2 You also hereby grant other user of TM Website a non-exclusive license to access your User Content through the access and/or use of TM Website, and to use such User Content only as permitted through the functionality of TM Website. 10.3 You understand and agree that TM may retain and store, but not display, distribute, or perform, server copies of User Content that has been removed or deleted. The above licenses granted to TM, by You in User Content is irrevocable. 10.4 Further to the foregoing paragraph, by submitting your User Content to us, You warrant that:- (a) your User Content is your own original work or have the necessary license, rights, consents, and permissions to use and authorize us to use all patent, trademark, trade secret, copyright or other proprietary rights in and to any and all User Content to enable TM to use of the User Content in the manner required by us and that you have the right to make it available to us for all the purposes specified above; (b) your User Content is not defamatory, threatening, injurious, insulting character, offensive, abusive, offensive on moral, menacing, religious or political grounds, impair your confidentiality obligations; (c) your User Content does not infringe the law; (d) You shall be solely responsible for your own User Content and the consequences of posting or publishing them; (e) You will not submit material that is copyrighted, protected by trade secret or otherwise subject to third party proprietary rights, including privacy and publicity rights, unless you are the owner of such rights or have permission from their rightful owner to post material and to grant us all of the license rights granted herein; and/or (f) waive any moral rights in your User Content for the purposes of its submission to and publication in TM Website and the purposes specified above. 10.5 You understand that whether or not such User Content is posted, TM does not guarantee any confidentiality with respect to any User Content. TM does not endorse any User Content or any opinion, recommendation, or advice expressed therein, and expressly disclaims any and all liability in connection with User Content. We do not permit activities which will infringe any Intellectual Property Rights including copyright and we will remove all infringing contents and User Content upon notification that such Content or User Content infringes on another’s Intellectual Property Rights. We further reserve the right to remove any Content or User Content without prior notice. 10.6 You understand and agree that we may review and delete any User Content that you posted at any time without notice, without liability and for any reason whatsoever, especially if you breach the terms and conditions herein. 10.7 We reserve the right to investigate and take appropriate legal action, in our sole discretion, against You for the User Content especially if it violates TM policy and report you to the Appropriate Authority.

  • Signaling Each Party will provide the other Party with access to its databases and associated signaling necessary for the routing and completion of the other Party’s traffic in accordance with the provisions contained in the Unbundled Network Element Attachment or applicable access tariff.

  • Television Equipment Recycling Program If this Contract is for the purchase or lease of covered television equipment, then Contractor certifies that it is compliance with Subchapter Z, Chapter 361 of the Texas Health and Safety Code related to the Television Equipment Recycling Program.

  • Data Access Control Persons entitled to use data processing systems gain access only to the Personal Data that they have a right to access, and Personal Data must not be read, copied, modified or removed without authorization in the course of processing, use and storage.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!