The notebooks faceted browser Sample Clauses

The notebooks faceted browser. ‌ Ask is currently subject to intense development, and one of the most interesting recent features is the notebooks faceted browser. This is a very powerful feature for analysing a corpus of annotations. The notebooks faceted browser is a way of exploring the whole graph composed by all the annotations contained in a set of notebooks. A user can select (by opening them in Ask) a set of public notebooks he finds of interest, then possibly adding his own private ones (again, by simply opening them) and then, by clicking the “Facets” link at top-right, he can then explore all the opened notebooks as shown in Figure 11.
AutoNDA by SimpleDocs

Related to The notebooks faceted browser

  • Images If applicable, the CONSULTANT is prohibited from capturing on any visual medium images of any property, logo, student, or employee of the DISTRICT, or any image that represents the DISTRICT without express written consent from the DISTRICT.

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • Technical Requirements for SCPs/Databases 10.5.3.1 BellSouth shall provide physical access to SCPs through the SS7 network and protocols with TCAP as the application layer protocol.

  • LIMITATIONS ON REVERSE ENGINEERING, DECOMPILATION AND DISASSEMBLY You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • ROAD TOLERANCES Purchaser shall perform road work within the tolerances listed below. The tolerance class for each road is listed on the TYPICAL SECTION SHEET. Tolerance Class A B C Road and Subgrade Width (feet) +1.5 +1.5 +2.0 Subgrade Elevation (feet +/-) 0.5 1.0 2.0 Centerline alignment (feet lt./rt.) 1.0 1.5 3.0 1-6 ORDER OF PRECEDENCE Any conflict or inconsistency in the road plan will be resolved by giving the documents precedence in the following order:

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Formats Formats for records must be satisfactory to FTA and include, but are not limited to, electronic records, including any emails related to the Award, records on paper, and records created in other formats.

Time is Money Join Law Insider Premium to draft better contracts faster.