UTM Sample Clauses

UTM. Unified Threat Management consolidates multiple security and networking functions with one unified appliance that protects businesses and simplifies infrastructure.
AutoNDA by SimpleDocs

Related to UTM

  • Compatibility 1. Any unresolved issue arising from a mutual agreement procedure case otherwise within the scope of the arbitration process provided for in this Article and Articles 25A to 25G shall not be submitted to arbitration if the issue falls within the scope of a case with respect to which an arbitration panel or similar body has previously been set up in accordance with a bilateral or multilateral convention that provides for mandatory binding arbitration of unresolved issues arising from a mutual agreement procedure case. 2. Nothing in this Article and Articles 25A to 25G shall affect the fulfilment of wider obligations with respect to the arbitration of unresolved issues arising in the context of a mutual agreement procedure resulting from other conventions to which the Contracting States are or will become parties.”.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Speed The relative importance we attach is “high”.

  • Dimensions Education: Bachelor’s or Master’s Degree in Computer Science, Information Systems, or other related field. Or equivalent work experience. A minimum of 10 years of IT (including Web/Internet, database applications and data warehousing) and business/industry work experience, with at least 3 years of leadership experience in managing multiple, large, cross-functional teams or project, and influencing senior level management and key stakeholders.

  • Scaling “Scaling,” as used herein, involves:

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Year 2000 Compatibility Take all action necessary to assure that its computer based systems are able to operate and effectively process data including dates on and after January 1, 2000, and, at the reasonable request of the Administrative Agent or the Required Lenders, provide evidence to the Lenders of such year 2000 compatibility.

  • Logging The ISP will require the maintenance of network and application logs as part of BNY Mellon’s security information and event management processes. Logs are retained in accordance with law applicable to BNY Mellon’s provision of the services as well as BNY Mellon’s applicable policies. BNY Mellon uses various tools in conjunction with such logs, which may include behavioral analytics, security monitoring case management, network traffic monitoring and analysis, IP address management and full packet capture.

  • Uptime bookinglab shall ensure that the Booking Service will be available, excluding Downtime caused by Scheduled Maintenance, Emergency Maintenance or Force Majeure event, 99.5% of the time in any one calendar month (first day to last day) (the “Service Level”). The Service Level will not apply (and therefore no Service Credits will be applicable) to the extent that any Service Level Failure is caused by: (a) a Penetration Test conducted by Customer without the prior written approval of bookinglab; or (b) Customer’s failure to comply with specific instructions provided by bookinglab; or (c) a failure of the Customer to comply with any Customer responsibility or obligation detailed in a Statement of Work, Order Form or the Master Subscription Agreement; or (d) Customer’s failure to adhere to JRNI’s or bookinglab’s best practice guidelines for the use of the API.

  • Layout a. Estimate and quantity sheet (1) List of all bid items (2) Bid item quantities (3) Specification item number (4) Paid item description and unit of measure b. Basis of estimate sheet (list of materials) c. General notes and specification data. d. Condition diagram (1) Highway and intersection design features (2) Roadside development (3) Traffic control including illumination e. Plan sheet(s) (1) Existing traffic control that will remain (signs and markings) (2) Existing utilities (3) Proposed highway improvements (4) Proposed installation (5) Proposed additional traffic controls (6) Proposed illumination attached to signal poles. (7) Proposed power pole source f. Notes for plan layout g. Phase sequence diagram(s) (1) Signal locations (2) Signal indications (3) Phase diagram (4) Signal sequence table (5) Flashing operation (normal and emergency) (6) Preemption operation (when applicable) (7) Contact responsible Agency to obtain interval timing, cycle length and offset h. Construction detail sheets(s) (1) Poles (State standard sheets) (2) Detectors (3) Pull Box and conduit layout (4) Controller Foundation standard sheet (5) Electrical chart i. Marking details (when applicable)

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!