Voicemail Transcription Sample Clauses

Voicemail Transcription. The voicemail transcription feature transcribes a voicemail into text that is delivered via email. The quality of transcripts varies and in certain cases this feature may not be available. An additional charge applies.
AutoNDA by SimpleDocs

Related to Voicemail Transcription

  • Video This restriction includes, but is not limited to, use of the Beat and/or New Song in television, commercials, film/movies, theatrical works, video games, and in any other form on the Internet which is not expressly permitted herein.

  • Message Screening 7.4.4.4.1 BellSouth shall set message screening parameters so as to accept valid messages from AFN local or tandem switching systems destined to any signaling point within BellSouth’s SS7 network where the AFN switching system has a valid signaling relationship.

  • Computer The Contractor shall maintain at its office for its use a computer with, at a minimum, a 1 GHz processor and an internet connection. The Contractor shall maintain individual email accounts for each of its project managers.

  • Electronic Electronic" means relating to technology having electrical, digital, magnetic, wireless, optical, electromagnetic or similar capabilities. [PL 1999, c. 762, §2 (NEW).]

  • Electronic Devices No electronic devices that may hinder job performance or safety (especially cell phones), may be carried on employees’ person, or be used by employees during working hours.

  • Cryptography Supplier will maintain policies and standards on the use of cryptographic controls that are implemented to protect Accenture Data.

  • Bibliography [Ben83] Xxxxxxx Xxx-Or. Another advantage of free choice (extended ab- stract): Completely asynchronous agreement protocols. In Proceed- ings of the second annual ACM symposium on Principles of distrib- uted computing, pages 27–30. ACM, 1983. [BG89] Xxxxx Xxxxxx and Xxxx X Xxxxx. Asymptotically optimal distributed consensus. Springer, 1989. [BGP89] Xxxxx Xxxxxx, Xxxx X. Xxxxx, and Xxxxxxx X. Xxxxx. Towards optimal distributed consensus (extended abstract). In 30th Annual Symposium on Foundations of Computer Science, Research Triangle Park, North Carolina, USA, 30 October - 1 November 1989, pages 410–415, 1989. [BT85] Xxxxxxx Xxxxxx and Xxx Xxxxx. Asynchronous consensus and broadcast protocols. Journal of the ACM (JACM), 32(4):824–840, 1985. [DGM+11] Xxxxxxxx Xxxxx, Xxxxxx Xxx Xxxxxxxx, Xxxxxx Xxxxxx, Xxxxxx Xxxxxxxxx, and Xxxxxxxxx Xxxxxxxxxx. Stabilizing Consensus with the Power of Two Choices. In Proceedings of the Twenty-third Annual ACM Symposium on Parallelism in Algorithms and Architectures, SPAA, June 2011. [DS83] Xxxxx Xxxxx and X. Xxxxxxx Xxxxxx. Authenticated algorithms for byzantine agreement. SIAM Journal on Computing, 12(4):656–666, 1983. [FG03] Xxxxxxxx Xxxxx and Xxxx X Xxxxx. Efficient player-optimal protocols for strong and differential consensus. In Proceedings of the twenty- second annual symposium on Principles of distributed computing, pages 211–220. ACM, 2003.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!