Use of Timestamp Field Sample Clauses

Use of Timestamp Field. Granularity and interpretation of the Timestamp Information Field is implementation specific. The primary use of the Timestamp Information Field is to measure the differential delay between bundle links in a bundle. The Timestamp Information Field may be used to determine if a bundle link has a much more substantial differential delay than other bundle links in the same bundle. The implementing endpoint then can determine if the differential delay is in a tolerable range and decide to remove or keep the bundle link in operation.
AutoNDA by SimpleDocs

Related to Use of Timestamp Field

  • Particular Methods of Procurement of Goods and Works International Competitive Bidding. Goods and works shall be procured under contracts awarded on the basis of International Competitive Bidding.

  • Misuse of TINs If the requester discloses or uses TINs in violation of federal law, the requester may be subject to civil and criminal penalties. Specific Instructions Line 1 You must enter one of the following on this line; do not leave this line blank. The name should match the name on your tax return. If this Form W-9 is for a joint account (other than an account maintained by a foreign financial institution (FFI)), list first, and then circle, the name of the person or entity whose number you entered in Part I of Form W-9. If you are providing Form W-9 to an FFI to document a joint account, each holder of the account that is a U.S. person must provide a Form W-9.

  • Use of Trademark In the case that the Subscriber provides a telecommunication service to an Subscriber’s Customer pursuant to Section 8.1, if the Subscriber desires to use SORACOM’s trademark, the Subscriber shall obtain SORACOM’s consent in writing to do so before using SORACOM’s trademark, and shall comply with any other conditions relating to the use of SORACOM’s trademark specified by SORACOM separately.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • USE OF TBS ACCESS CODE (a) An Account Holder may operate the TBS in relation to his Account by using his TBS Access Code.

  • Use of Software Any software that is available on the Services ("Software") is the copyrighted work of Red Hat and/or its licensors. Copying or reproducing the Software to any other server or location for further reproduction or redistribution is strictly prohibited, unless such reproduction or redistribution is permitted by a license agreement accompanying such Software. You may not create derivative works of the Software, or attempt to decompile or reverse-engineer the Software unless otherwise permitted by law. Use of the Software is subject to the license terms of any license agreement that may accompany or is provided with the Software. You may not download any Software until you have read and accepted the terms of the accompanying software license. WITHOUT LIMITING THE FOREGOING, THE SOFTWARE IS WARRANTED, IF AT ALL, ONLY ACCORDING TO THE TERMS OF THE SEPARATE LICENSE AGREEMENT ACCOMPANYING THE SOFTWARE. EXCEPT AS WARRANTED IN SUCH LICENSE AGREEMENT, RED HAT, ITS PARENT, SUBSIDIARY, AND AFFILIATE COMPANIES, AND ITS LICENSORS DISCLAIM ALL WARRANTIES AND CONDITIONS WITH REGARD TO THE SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT, TO THE MAXIMUM EXTENT PERMITTED BY LAW.

  • Use of Trademarks Subject to the terms and conditions hereof, Sponsor hereby represents and warrants that it has the power and authority to grant, and does hereby grant to Show Management a non-exclusive, nontrans- ferable, royalty-free, worldwide license to reproduce and display all logos, trademarks, trade names and similar identifying material relating to Sponsor (the ”Sponsor Marks”) solely in connection with the promotion, marketing and distribution of the parties in accordance with the terms hereof, provided, however, that Show Management shall, other than as specifically provided for in this Agreement, not make any specific use of any Sponsor Mark without first submitting a sample of such use to Spon- sor and obtaining its prior consent, which consent shall not be unreasonably withheld. The foregoing license shall terminate upon the effective date of expiration of this Agreement.

  • Other Methods of Procurement of Goods and Works The following table specifies the methods of procurement, other than International Competitive Bidding, which may be used for goods and works. The Procurement Plan shall specify the circumstances under which such methods may be used: Procurement Method

  • Use of Products 3.28.1 In the performance of this contract, Consultant shall make maximum use of products containing recovered materials that are EPA-designated items unless the product cannot be acquired (i) competitively within a timeframe providing for compliance with the contract performance schedule; (ii) meeting contract performance requirements; or (iii) at a reasonable price.

  • SOURCE CODE ESCROW FOR LICENSED PRODUCT If Source Code or Source Code escrow is offered by either Contractor or Product manufacturer or developer to any other commercial customers, Contractor shall either: (i) provide Licensee with the Source Code for the Product; or (ii) place the Source Code in a third party escrow arrangement with a designated escrow agent who shall be named and identified to the State, and who shall be directed to release the deposited Source Code in accordance with a standard escrow agreement acceptable to the State; or (iii) will certify to the State that the Product manufacturer/developer has named the State, acting by and through the Authorized User, and the Licensee, as a named beneficiary of an established escrow arrangement with its designated escrow agent who shall be named and identified to the State and Licensee, and who shall be directed to release the deposited Source Code in accordance with the terms of escrow. Source Code, as well as any corrections or enhancements to such source code, shall be updated for each new release of the Product in the same manner as provided above and such updating of escrow shall be certified to the State in writing. Contractor shall identify the escrow agent upon commencement of the Contract term and shall certify annually that the escrow remains in effect in compliance with the terms of this clause. The State may release the Source Code to Licensees under this Contract who have licensed Product or obtained services, who may use such copy of the Source Code to maintain the Product.

Time is Money Join Law Insider Premium to draft better contracts faster.