Application Interoperability Clause Samples

Application Interoperability. The Contractor shall not impede interoperability between carriers and third party system/service providers. The Contractor shall take reasonable efforts to ensure that applications made available through its FirstNet applications ecosystem area interoperable with other apps within the ecosystem.
Application Interoperability. Contractor’s Agenda system solution shall: 1. Be a SAAS system that is a fully configurable COTS system capable of interfacing with other County systems for data exchange, including, but not limited to, the following systems: • Crestron system – The Agenda system shall provide an automated electronic data feed to the Crestron system that complies with the current feed’s file structure in text format. A sample of this feed is provided in Appendix 2, Sample Feed to Crestron system. The Agenda system shall create and save this feed to a specific location when the agenda is published. Every time an agenda is published, a new file should be created and should overwrite the previous file. In this text file, the agenda items should be separated by the numbering system of ‘1.’, 2.’, ‘3.’, etc. • Granicus/GovTV - The Agenda system shall provide an interface allowing the published agenda (HTML format) to be fed to the GovTV system to allow constituents to access the • Agendas and meeting minutes via the BOS online meetings (current and past) site on the County of Orange internet page (▇▇▇▇://▇▇▇▇▇.▇▇▇▇▇▇▇▇.▇▇▇/ViewPublisher.php?view_id=6). 2. Utilize SQL Server 2016 R2 backend database, if the solution involves hosting and database administration by the County. 3. Be Web based and browser agnostic.

Related to Application Interoperability

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Equipment and Software Any costs incurred by Kodak resulting from Customer (1) changes to the configuration of the Equipment or Software, or (2) postponement of Delivery or installation of the Equipment or Software;

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.