WIREPRO Sample Clauses

WIREPRO. The WirePro software application is used for the automated production of harnesses using any Xxxxxxx engineering AutoStrip machine and Marker combination. This package comes with a large number of optional configurations and provides maximum flexibility for processing wire.  This manual is used for WirePro only.
AutoNDA by SimpleDocs

Related to WIREPRO

  • -wire ADSL-Compatible Loop This is a designed Loop that is provisioned according to Revised Resistance Design (RRD) criteria and may be up to 18,000 feet long and may have up to 6,000 feet of bridged tap (inclusive of Loop length). The Loop is a 2-wire circuit and will come standard with a test point, OC, and a DLR.

  • wire HDSL-Compatible Loop This is a designed Loop that meets Carrier Serving Area (CSA) specifications, may be up to 12,000 feet long and may have up to 2,500 feet of bridged tap (inclusive of Loop length). It may be a 2-wire or 4-wire circuit and will come standard with a test point, OC, and a DLR.

  • MOBILE DATA COMPUTERS 20 1. As part of the law enforcement services to be provided to CITY, COUNTY 21 has provided, or will provide, mobile data computers (hereinafter called 22 “MDCs”) that are or will be mounted in patrol vehicles and motorcycles, 23 designated by COUNTY for use within CITY limits.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • wire Unbundled ISDN Digital Loops These will be provisioned according to industry standards for 2-Wire Basic Rate ISDN services and will come standard with a test point, OC, and a DLR. NewPhone will be responsible for providing BellSouth with a Service Profile Identifier (SPID) associated with a particular ISDN-capable Loop and customer. With the SPID, BellSouth will be able to adequately test the circuit and ensure that it properly supports ISDN service.

  • Data Storage Where required by applicable law, Student Data shall be stored within the United States. Upon request of the LEA, Provider will provide a list of the locations where Student Data is stored.

  • Automation 1. Each Party shall use information technologies that expedite its procedures for the release of goods in order to facilitate trade, including trade between the Parties.

  • Searchable Whois Notwithstanding anything else in this Agreement, Registry Operator must offer a searchable Whois service compliant with the requirements described in Section 1.10 of Specification 4 of this Agreement. Registry Operator must make available the services only to authenticated users after they logged in by supplying proper credentials (i.e., user name and password). Registry Operator must issue such credentials exclusively to eligible users and institutions that supply sufficient proof of their legitimate interest in this feature (e.g., law enforcement agencies).

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

Time is Money Join Law Insider Premium to draft better contracts faster.