Wireless Traffic Sample Clauses

Wireless Traffic. 7.3.1 Appendix Wireless, attached hereto and incorporated by reference sets forth the terms and conditions under which the Parties will distribute revenue from their joint provision of Wireless Interconnection Service for mobile to landline traffic terminating through the Parties' respective wireline switching networks within a LATA. If one Party enters into an interconnection agreement with a CMRS provider, Appendix Wireless shall no longer be applicable between the Parties with respect to such CMRS providers, and the other Party shall be obligated to enter into an agreement with such CMRS provider for the termination of wireless to landline traffic.
AutoNDA by SimpleDocs
Wireless Traffic. 16 8.0 SIGNALING............................................................... 17 9.0 NUMBERING............................................................... 17 10.0 RESALE -- SECTIONS 251(b)(1); 251(c)(4); 252(d)(3); and 271(c)(2)(B)(xiv)...................................................... 19
Wireless Traffic. 22 8.0 SIGNALING..............................................................23 9.0 NUMBERING..............................................................23 GENERAL TERMS AND CONDITIONS - KS PAGE 3 OF 50 SWBT/BIRCH TELECOM OF KANSAS, INC. 100198
Wireless Traffic. 7.3.1 Appendix Wireless, attached hereto and incorporated by reference sets forth the terms and conditions under which the Parties will distribute revenue from their joint provision of Wireless Interconnection Service for mobile to landline traffic terminating through the Parties' respective wireline switching networks within a LATA. Appendix Wireless, however, applies only to the division of revenue received pursuant to SWBT's currently existing Wireless Interconnection Tariff. If one Party enters into an interconnection agreement with a CMRS provider, Appendix Wireless shall no longer be applicable between the Parties with respect to traffic involving such CMRS provider, and the other Party shall make arrangements with such CMRS provider as it deems appropriate for the termination of that CMRS provider's traffic. Similarly, should SWBT substantively change its existing Wireless Interconnection Tariff, or should Optel adopt a generally applicable Wireless Interconnection Tariff, the parties agree to re-establish appropriate means for the division of revenue, if any, under the new or changed tariff.
Wireless Traffic. Actual traffic Conversation MOU measurement in each of the applicable Authorized Service categories is the preferred method of classifying and billing traffic. If, however, either Party cannot measure traffic in each

Related to Wireless Traffic

  • Network PHARMACY is a retail, mail order or specialty pharmacy that has a contract to accept our pharmacy allowance for prescription drugs and diabetic equipment or supplies covered under this plan. NETWORK PROVIDER is a provider that has entered into a contract with us or other Blue Cross and Blue Shield plans. For pediatric dental care services, network provider is a dentist that has entered into a contract with us or participates in the Dental Coast to Coast Network. For pediatric vision hardware services, a network provider is a provider that has entered into a contract with EyeMed, our vision care service manager.

  • Programming (a) Pursuant to Section 624 of the Cable Act, the Licensee shall maintain the mix, quality and broad categories of Programming set forth in Exhibit 4, attached hereto and made a part hereof. Pursuant to applicable federal law, all Programming decisions, including the Programming listed in Exhibit 4, attached hereto, shall be at the sole discretion of the Licensee.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Business Travel, Lodging, etc Employer shall reimburse Executive for reasonable travel, lodging, meal and other reasonable expenses incurred by him/her in connection with his/her performance of services hereunder upon submission of evidence, satisfactory to Employer, of the incurrence and purpose of each such expense and otherwise in accordance with Employer’s business travel reimbursement policy applicable to its senior executives as in effect from time to time.

  • Telecommunications Each Lender and Administrative Agent shall be entitled to rely on the authority of any individual making any telecopy, electronic or telephonic notice, request, or signature without the necessity of receipt of any verification thereof.

  • Telecommunications Services The offering of telecommunications for a fee directly to the public, or to such classes of users as to be effectively available directly to the public, regardless of the facilities used.

  • Communications and Computer Lines Tenant may at any time install, maintain, replace, remove or usc any communications fiber optics and/or computer wires and cables (collectively, the “Lines”) at, under or through the Project in or serving the Premises, provided that (i) Tenant shall obtain Landlord’s prior written consent, use an experienced and qualified contractor approved in writing by Landlord, and comply with all of the other provisions of Articles 7 and 8 of this Lease, (ii) an acceptable number of spare Lines and space for additional Lines shall be maintained for existing and future occupants of the Project, as determined in Landlord’s reasonable opinion, (iii) the Lines therefor (including riser cables) shall be appropnately insulated to prevent excessive electromagnetic fields or radiation, and shall be surrounded by a protective conduit(iv) any new or existing Lines servicing the Premises shall comply with all applicable Laws, (v) as a condition to permitting the installation of new Lines, Landlord may require that Tenant remove existing Lines located in or serving the Premises and repair any damage in connection with such removal, and (vi) Tenant shall pay all costs in connection therewith, including any fees charged by Landlord for Tenant’s use of the Building’s telecommunications capacity in excess of Tenant’s pro rats share thereof. Landlord reserves the right to require that Tenant remove any Lines located in or serving the Premises which are installed in violation of these provisions, or which are at any time in violation of any applicable Laws or represent a dangerous or potentially dangerous condition. 29.32

  • Internet Access Data and information may be made electronically accessible to the Company through Internet access to one or more links provided by the Administrator or a sub-administrator (“Web Link”). All rights in Web Link (including text and “look and feel” attributes) are owned by the sub-administrator. Any commercial use of the content or any other aspect of Web Link requires the written permission of the sub-administrator. Use of the Web Link by the Company will be subject to any terms of use set forth on the web site. Web Link and the information (including text, graphics and functionality) in the Web Link is presented “As Is” and “As Available” without express or implied warranties including, but not limited to, implied warranties of non-infringement, merchantability and fitness for a particular purpose. The sub-administrator neither warrants that the Web Link will be uninterrupted or error free, nor guarantees the accessibility, reliability, performance, timeliness, sequence, or completeness of information provided on the Web Link.

  • Cellular Phone Employer shall provide Employee with a cellular phone for his use in performing his responsibilities with Employer. In the alternative, Employer shall pay Employee’s cellular phone expense.

  • Incident Event and Communications Management a. Incident Management/Notification of Breach - Transfer Agent shall develop, implement and maintain an incident response plan that specifies actions to be taken when Transfer Agent or one of its subcontractors suspects or detects that a party has gained material unauthorized access to Fund Data or systems or applications containing any Fund Data (the “Response Plan”). Such Response Plan shall include the following:

Time is Money Join Law Insider Premium to draft better contracts faster.