Technical Plenary Sample Clauses

Technical Plenary. The Technical Plenary has total responsibility for the oneM2M technical activities. It is also responsible for the organization of the technical work and it can autonomously create sub groups.
AutoNDA by SimpleDocs
Technical Plenary. The Technical Plenary is in charge of the oneM2M technical activities. It is also responsible for the organization of the technical work organization and it can autonomously decide the creationcreate of Working Groups. The chairmen Cchairs of the Ttechnical Pplenary and its subgroups can attend the Steering Committee.The Technical Plenary has total responsibility for the oneM2M technical activities. It is also responsible for the organization of the technical work and it can autonomously create sub groups.
Technical Plenary. The Technical Plenary has total responsibility for is in charge of the technical activities. It is also responsible for the organization of the technical work organization and it can autonomously decide the creation of official sub groups. (Recommended to remove this sentence as it is more appropriate to be included in the WPD. If it is decided to retain this sentence, then need to clarify that chairs of TP and WGs do not have voting rights in the SC.)The chairmen of the technical plenary and its official sub groups can attend the Steering Committee.
Technical Plenary. After Xxxxxx Xxxxxx, chair of the IAB, opened the technical plenary session, Xxxxx Xxxx, the chairman of the Internet Research Task Force (IRTF) gave an update on the work of the IRTF. As reported at the last IETF, the IRTF is reaching out to the research community. In order to attract more researchers to actively work in the IRTF, Xxxxx published an article in the ACM Computer Communication Review: xxxx://xxx.xxx.xxx/sigs/sigcomm/ccr/archive/2005/october/p69- xxxx.pdf Two new Research Groups have been set up: one on Transport Modelling (TMRG) and one to work on Internet Congestion Control (ICCRG). In addition to that there are currently ten Research Groups active in the IRTF. In the future there might be new work on small-group multicast. The Routing RG held a meeting with the IAB to review the status of the research. Xxxxx has also been working with the IETF attorney to find out if the IETF Intellectual Property Rights (IPR) policy could be applied to the IRTF. Finally, the IRTF started to use the Friday afternoon slots for RG meetings. At this IETF the Host Identity Protocol Research Group (hiprg) met. The next presenter was Xxxxx XxXxxx who gave a report on recent findings of the Crypto Forum Research Group (CFRG). The discussion on specific cryptography mechanisms concluded with a suggestion for people active in the security area to publish a document with recommendations for specific mechanisms (also see the article by Xxxx Xxxxxxxx in this issue of the IETF Journal). The IAB Chair Xxxxxx Xxxxxx provided an expanded update at IETF64. Taking the opportunity of the NomCom cycle (looking for next year's IAB members) she provided an overview of the IAB's documented responsibilities and used that to give context to reported IAB activities (see 'News from the IAB' for a full IAB report).
Technical Plenary. Machine-to-Machine Solution A combination of devices, software and services that operate with little or no human interaction.

Related to Technical Plenary

  • of the Technical Provisions The Project Schedule shall be used by the Parties for planning and monitoring the progress of the Work and as the basis for determining the amount of monthly progress payments to be made to DB Contractor.

  • Definitions of General Application For purposes of this Agreement, unless otherwise specified: Agreement means the Free Trade Agreement between the Government of the People's Republic of China and the Government of the Republic of Peru; Commission means the Free Trade Commission established under Article 170 (Free Trade Commission) of Chapter 14 (Administration of the Agreement);

  • Technical Safeguards 1. USAC and DSS will process the data matched and any data created by the match under the immediate supervision and control of authorized personnel to protect the confidentiality of the data, so unauthorized persons cannot retrieve any data by computer, remote terminal, or other means. 2. USAC and DSS will strictly limit authorization to these electronic data areas necessary for the authorized user to perform their official duties. All data in transit will be encrypted using algorithms that meet the requirements of the Federal Information Processing Standard (FIPS) Publication 140-2 or 140-3 (when applicable). 3. Authorized system users will be identified by User ID and password, and individually tracked to safeguard against the unauthorized access and use of the system. System logs of all user actions will be saved, tracked and monitored periodically. 4. USAC will transmit data to DSS via encrypted secure file delivery system. For each request, a response will be sent back to USAC to indicate success or failure of transmission.

  • Technical Documentation Prior to commencement of the Tests on Completion, the Contractor shall supply to the Engineer the technical documentation as specified in the Employer’s Requirements. The Works or Section shall not be considered to be completed for the purposes of taking- over under sub-clause 10.1 [Taking Over of the Works and Sections] until the Engineer has received the technical documentation as defined in this sub-clause 5.7, the "history file" including design calculations and certain certification as well as any other documents required to meet the CE Marking requirements.

  • Technical Services Party B will provide technical services and training to Party A, taking advantage of Party B’s advanced network, website and multimedia technologies to improve Party A’s system integration. Such technical services shall include: (a) administering, managing and maintaining Party A’s information application system and website system infrastructure; (b) providing system optimization plans and implementing optimization features; (c) assuring the security and reliability of the website application systems; (d) procuring, installing and supporting the relevant products produced by Party B, and providing training in the use of those products; (e) managing and maintaining all network and providing technologies to assure the reliability and efficiency thereof; (f) providing information technology services and assuring the reliable operation of the information infrastructure.

  • Project Management Plan 3.2.1 Developer is responsible for all quality assurance and quality control activities necessary to manage the Work, including the Utility Adjustment Work. Developer shall undertake all aspects of quality assurance and quality control for the Project and Work in accordance with the approved Project Management Plan, Good Industry Practice and applicable Law. 3.2.2 Developer shall develop the Project Management Plan and its component parts, plans and other documentation in accordance with the requirements set forth in Section 1.5.2.5

  • Contractor’s Project Manager and Key Personnel Contractor shall appoint a Project Manager to direct the Contractor’s efforts in fulfilling Contractor’s obligations under this Contract. This Project Manager shall be subject to approval by the County and shall not be changed without the written consent of the County’s Project Manager, which consent shall not be unreasonably withheld. The Contractor’s Project Manager shall be assigned to this project for the duration of the Contract and shall diligently pursue all work and services to meet the project time lines. The County’s Project Manager shall have the right to require the removal and replacement of the Contractor’s Project Manager from providing services to the County under this Contract. The County’s Project manager shall notify the Contractor in writing of such action. The Contractor shall accomplish the removal within five (5) business days after written notice by the County’s Project Manager. The County’s Project Manager shall review and approve the appointment of the replacement for the Contractor’s Project Manager. The County is not required to provide any additional information, reason or rationale in the event it The County is not required to provide any additional information, reason or rationale in the event it requires the removal of Contractor’s Project Manager from providing further services under the Contract.

  • Management of Special and Technical Environment Each certificated support person demonstrates an acceptable level of performance in managing and organizing the special materials, equipment and environment essential to the specialized programs.

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • Technical and Organisational Measures (1) Before the commencement of processing, the Supplier shall document the execution of the necessary Technical and Organisational Measures, set out in advance of the awarding of the Order or Contract, specifically with regard to the detailed execution of the contract, and shall present these documented measures to the Client for inspection. Upon acceptance by the Client, the documented measures become the foundation of the contract. Insofar as the inspection/audit by the Client shows the need for amendments, such amendments shall be implemented by mutual agreement. (2) The Supplier shall establish the security in accordance with Article 28 Paragraph 3 Point c, and Article 32 GDPR in particular in conjunction with Article 5 Paragraph 1, and Paragraph 2 GDPR. The measures to be taken are measures of data security and measures that guarantee a protection level appropriate to the risk concerning confidentiality, integrity, availability and resilience of the systems. The state of the art, implementation costs, the nature, scope and purposes of processing as well as the probability of occurrence and the severity of the risk to the rights and freedoms of natural persons within the meaning of Article 32 Paragraph 1 GDPR must be taken into account. [Details in Appendix 1] (3) The Technical and Organisational Measures are subject to technical progress and further development. In this respect, it is permissible for the Supplier to implement alternative adequate measures. In so doing, the security level of the defined measures must not be reduced. Substantial changes must be documented.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!