wire HDSL-Compatible Loop Sample Clauses

wire HDSL-Compatible Loop. This is a designed Loop that meets Carrier Serving Area (CSA) specifications, may be up to 12,000 feet long and may have up to 2,500 feet of bridged tap (inclusive of Loop length). It may be a 2-wire or 4-wire circuit and will come standard with a test point, OC, and a DLR.
AutoNDA by SimpleDocs

Related to wire HDSL-Compatible Loop

  • -wire ADSL-Compatible Loop This is a designed Loop that is provisioned according to Revised Resistance Design (RRD) criteria and may be up to 18,000 feet long and may have up to 6,000 feet of bridged tap (inclusive of Loop length). The Loop is a 2-wire circuit and will come standard with a test point, OC, and a DLR.

  • Dark Fiber Loop 2.8.4.1 Dark Fiber Loop is an unused optical transmission facility, without attached signal regeneration, multiplexing, aggregation or other electronics, from the demarcation point at an End User’s premises to the End User’s serving wire center. Dark Fiber Loops may be strands of optical fiber existing in aerial or underground structure. BellSouth will not provide line terminating elements, regeneration or other electronics necessary for AFN to utilize Dark Fiber Loops.

  • Firefighters Any truck with an inoperative aerial ladder shall be regularly and routinely staffed with one (1) officer and five (5) firefighters for the period of time that the aerial ladder is inoperative, or until such time as the truck with the inoperative aerial ladder is replaced with a truck with an operative aerial ladder. At 0800 and 2000 hours, all trucks shall be staffed with one (1) officer and four (4) firefighters, and any truck with an inoperative aerial ladder shall be staffed with one (1) officer and five (5) firefighters.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Integrated Digital Loop Carriers The feeder portion of some loops may be provide by means of Integrated Digital Loop Carrier (IDLC). IDLC provides a fiber optic cable transmission path that travels directly into BellSouth’s central office local switch. Where BellSouth uses IDLC ,if technically feasible and capacity does exist, BST will provide Al-Call with a Designed DS0 UVL by using alternative provisioning techniques including but not limited to such as “hairpinning” and DAC grooming. Alternative provisioning techniques will be provided at no additional cost to Al-Call . Hairpinning involves providing a DS0 signal from an IDLC-served loop to Al-Call ’s collocation equipment by using a dedicated pathway that traverses BellSouth’s central office switch. BellSouth will provide such DS0 signal to Al-Call by establishing a copper cross connect between the BellSouth switch and Al-Call ’s collocation equipment.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

  • Telemedicine Services This plan covers clinically appropriate telemedicine services when the service is provided via remote access through an on-line service or other interactive audio and video telecommunications system in accordance with R.I. General Law § 27-81-1. Clinically appropriate telemedicine services may be obtained from a network or non- network provider, and from our designated telemedicine service provider. When you seek telemedicine services from our designated telemedicine service provider, the amount you pay is listed in the Summary of Medical Benefits. When you receive a covered healthcare service from a network or non-network provider via remote access, the amount you pay depends on the covered healthcare service you receive, as indicated in the Summary of Medical Benefits. For information about telemedicine services, our designated telemedicine service provider, and how to access telemedicine services, please visit our website or contact our Customer Service Department.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!