Streaming File Header (STREAMING_FILE_HEADER ) DES Sample Clauses

Streaming File Header (STREAMING_FILE_HEADER ) DES. As described in paragraph 10a, NSIF provides the STREAMING_FILE_HEADER to allow NSIF File creation or transfer before all NSIF File Header fields are populated. Table C-1-8(B) contains the STREAMING_FILE_HEADER field names, sizes, value ranges, and types. When an intentionally incomplete NSIF File Header is encountered, the NSIF File shall be processed by using the NSIF File Header values located in the STREAMING_FILE_HEADER. When used, the STREAMING_FILE_HEADER is located at or near the end of the NSIF File. To facilitate locating the DES, the STREAMING_FILE_HEADER contains two unique delimiter fields (SFH - Delimiter 1 (SFH- DELIM1) Field and SFH - Delimiter 2 (SFH-DELIM2) Field). The SFH-DELIM1 field precedes the STREAMING_FILE_HEADER and the SFH-DELIM2 field follows the STREAMING_FILE_HEADER. The SFH-DELIM1 field is preceded by the SFH Length 1 (SFH-L1) Field and the SFH-DELIM2 field is followed by the SFH Length 2 (SFH-L2) Field. The SFH-L1 and SFH-L2 fields are placed to ensure valid delimiters are found. The value of the SFH-DELIM1 field shall be equal to the value of the SFH-DELIM2 field, the value of the SFH-L1 field shall be equal to the value of the SFH-L2 field, and the number of characters between the SFH-DELIM1 field and the SFH-DELIM2 field must be equal to the value of the SFH-L1 and SFH-L2 fields. The STREAMING_FILE_HEADER may contain a complete NSIF File Header, a subset of the NSIF File Header, or may extend beyond the NSIF File Header to include fields within the subsequent Image Subheader and beyond. If the NSIF File contains more than one DES, the STREAMING_FILE_HEADER shall be the final DES.
AutoNDA by SimpleDocs

Related to Streaming File Header (STREAMING_FILE_HEADER ) DES

  • Telephone Monitoring/Recording From time to time we may monitor and/or record telephone calls between you and us to assure the quality of our customer service or as required by applicable law.

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Streaming The Licensee is entitled to an unlimited amount audio streams (on all streaming platforms such as Spotify) and unlimited video streams (on all platforms supporting video such as Youtube) for the song(s) created with the composition. All streaming royalties generated by the Licensee's song(s) belong to the Licensee.

  • COMPUTER GRAPHICS FILES The Engineer agrees to comply with Attachment G, Computer Graphics Files for Document and Information Exchange, if determined by the State to be applicable to this contract.

  • Access to Files 12.01 A copy of any completed evaluation which is to be placed in a nurse's file shall be first reviewed with the nurse. The nurse shall initial such evaluation as having been read and shall have the opportunity to add views to such evaluation prior to it being placed in a file. Each nurse shall have reasonable access to the file for the purposes of reviewing any evaluations or formal disciplinary notations contained therein in the presence of the supervisor. A copy of the evaluation will be provided to the nurse at the nurse's request.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Why We Collect Information and For How Long We are collecting your data for several reasons: · To better understand your needs and provide you with the services you have requested; · To fulfill our legitimate interest in improving our services and products; · To send you promotional emails containing information we think you may like when we have your consent to do so; · To contact you to fill out surveys or participate in other types of market research, when we have your consent to do so; · To customize our website according to your online behavior and personal preferences. The data we collect from you will be stored for no longer than necessary. The length of time we retain said information will be determined based upon the following criteria: the length of time your personal information remains relevant; the length of time it is reasonable to keep records to demonstrate that we have fulfilled our duties and obligations; any limitation periods within which claims might be made; any retention periods prescribed by law or recommended by regulators, professional bodies or associations; the type of contract we have with you, the existence of your consent, and our legitimate interest in keeping such information as stated in this Policy.

  • Operator’s Security Contact Information Xxxxxxx X. Xxxxxxx Named Security Contact xxxxxxxx@xxxxxxxxx.xxx Email of Security Contact (000) 000-0000 Phone Number of Security Contact

  • TOOL STORAGE 1. A company shall provide on all construction jobs in towns and cities, and elsewhere where reasonably necessary and practicable (or if requested buy the employee), a suitable and secure waterproof lock-up solely for the purpose of storing employees’ tools, and on multi-storey and major projects the company shall provide, where possible, a suitable lock-up for employees’ tools within a reasonable distance of the work area of large groups of employees.

Time is Money Join Law Insider Premium to draft better contracts faster.