Virtualized System Sample Clauses

Virtualized System. All Intrusion Detection Systems in place should be configured to provide data on demand,to identify sources of a potential attack/intrusion at the network perimeter. • Systems should have the ability to detect a potential hostile attack. Examples include but are not limited to: Network Intrusion Detection or Host Intrusion Detection/Prevention. • Any single image of data classified as Confidential defines the minimum-security requirement for all virtual instances on the same host system. • Virtualized systems may contain data classified as Confidential Information. (c) Applications thatrequire physical separation cannot be on the same host system.
AutoNDA by SimpleDocs

Related to Virtualized System

  • Specialized Services The specialized consultant services identified in the following list are included in Additional Services: Providing financial feasibility or other special studies. Providing planning surveys, site evaluations, environmental studies or comparative studies of prospective sites. Providing services relative to future facilities, systems and equipment which are not intended to be constructed during the Construction Phase. Providing services to make detailed investigation of existing conditions or facilities or to make measured drawings thereof, other than to verify the accuracy of drawings or other information furnished by the Owner. Providing coordination of Work performed by Owner’s separate Contractors or by the Owner’s own forces. Providing services in connection with the Work of a Contractor or separate consultants retained by the Owner other than commissioning consultant, testing and balance consultant, material testing firms or similar firms. Providing services for planning tenant or rental spaces. Making revisions in Drawings, Specifications or other documents when such revisions are inconsistent with written approvals or instructions previously given are required by the enactment or revision of codes, laws of regulations subsequent to the preparation of such documents or are due to other causes not solely within the control of the Project Architect. Making extensive investigations, surveys, valuations, inventories or detailed appraisals of existing facilities, except as otherwise required by the Agreement, and ser­vices required in connec­tion with construction performed by the Owner. Providing consultation concerning replacement of any Work damaged by fire or other cause during construction, and furnishing services as may be required in connection with the replacement of such Work. Providing services made necessary by the default of the Contractor, or by major defects or deficiencies in the Work of the Contractor, or by failure of performance of the Contractor under the Contract for Construction. Providing extensive assistance in the utilization of any equipment or system such as initial start-up or testing, adjusting and balancing, preparation of operation and maintenance manuals, training personnel for operation and maintenance, and consultation during operation. Providing services after the expiration of sixty (60) days following final payment to the Contractor, excluding any services necessary during the warranty period inspections and provided that all of Project Architect’s services as required under this Agreement have been satisfactorily completed. Preparing to serve or serving as an expert witness at the request of the Owner in connection with any public hearing, arbitration proceeding or legal proceeding. Providing any other services not otherwise customarily furnished in accordance with generally accepted architectural practice.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Internet Connectivity School must provide sufficient hardline internet connectivity and the required network configurations (provided in Exhibit A) for each Pixellot System to allow live broadcasts. PlayOn will provide the point-to-point wireless internet base station (“Point to Point”) when needed to deliver hardline internet connectivity to Pixellot Systems installed in outdoor venues; provided that PlayOn is able to select the make and model of the Point to Point system. In the event that School requests, or requires, a specific Point to Point system that is different from what is provided by PlayOn, then School must provide and install the Point to Point system at its own expense.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:

  • SPECIALIZED SERVICE REQUIREMENTS In the event that the Participating Entity requires service or specialized performance requirements not addressed in this Contract (such as e- commerce specifications, specialized delivery requirements, or other specifications and requirements), the Participating Entity and the Supplier may enter into a separate, standalone agreement, apart from this Contract. Sourcewell, including its agents and employees, will not be made a party to a claim for breach of such agreement.

  • Unbundled Network Elements 35.4.1. The charges that CLEC shall pay to Sprint for Unbundled Network Elements are set forth in Table One of this Agreement. 35.5. Collocation

  • System Upgrades The Connecting Transmission Owner shall procure, construct, install, and own the System Upgrade Facilities and System Deliverability Upgrades described in Attachment 6 of this Agreement. To the extent that design work is necessary in addition to that already accomplished in the Class Year Interconnection Facilities Study for the Interconnection Customer, the Connecting Transmission Owner shall perform or cause to be performed such work. If all the Parties agree, the Interconnection Customer may construct System Upgrade Facilities and System Deliverability Upgrades.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Unbundled Channelization (Multiplexing) 5.7.1 To the extent NewPhone is purchasing DS1 or DS3 or STS-1 Dedicated Transport pursuant to this Agreement, Unbundled Channelization (UC) provides the optional multiplexing capability that will allow a DS1 (1.544 Mbps) or DS3 (44.736 Mbps) or STS-1 (51.84 Mbps) Network Elements to be multiplexed or channelized at a BellSouth central office. Channelization can be accomplished through the use of a multiplexer or a digital cross-connect system at the discretion of BellSouth. Once UC has been installed, NewPhone may request channel activation on a channelized facility and BellSouth shall connect the requested facilities via COCIs. The COCI must be compatible with the lower capacity facility and ordered with the lower capacity facility. This service is available as defined in NECA 4.

Time is Money Join Law Insider Premium to draft better contracts faster.