NETWORK INTERCONNECTION METHODS 64.1 This Section sets forth the terms and conditions for Network Interconnection Methods (NIMs) provided between CenturyLink and CLEC for the Interconnection Facilities established between the Parties’ networks. Additionally, this Section describes the physical architecture for the Interconnection of the Parties’ facilities and equipment required for the transmission and routing of Local Traffic, ISP-Bound Traffic, IntraLATA LEC Toll Traffic, VoIP-PSTN Traffic, Transit Traffic and Jointly Provided Switched Access Service Traffic.
Power Factor Design Criteria Developer shall design the Large Generating Facility to maintain an effective power delivery at demonstrated maximum net capability at the Point of Interconnection at a power factor within the range established by the Connecting Transmission Owner on a comparable basis, until NYISO has established different requirements that apply to all generators in the New York Control Area on a comparable basis. The Developer shall design and maintain the plant auxiliary systems to operate safely throughout the entire real and reactive power design range. The Connecting Transmission Owner shall not unreasonably restrict or condition the reactive power production or absorption of the Large Generating Facility in accordance with Good Utility Practice.
Excellent Above Average Satisfactory Needs Improvement Unsatisfactory 5 4 3 2 1 5. The instructor demonstrates knowledge of the subject matter.
Benchmarks for Measuring Accessibility For the purposes of this Agreement, the accessibility of online content and functionality will be measured according to the W3C’s Web Content Accessibility Guidelines (WCAG) 2.0 Level AA and the Web Accessibility Initiative Accessible Rich Internet Applications Suite (WAI-ARIA) 1.0 for web content, which are incorporated by reference. Adherence to these accessible technology standards is one way to ensure compliance with the College’s underlying legal obligations to ensure that people with disabilities are able to acquire the same information, engage in the same interactions, and enjoy the same benefits and services within the same timeframe as their nondisabled peers, with substantially equivalent ease of use; that they are not excluded from participation in, denied the benefits of, or otherwise subjected to discrimination in any College programs, services, and activities delivered online, as required by Section 504 and the ADA and their implementing regulations; and that they receive effective communication of the College’s programs, services, and activities delivered online.
Deployment Method You may only install the Products on servers and workstations under the control of your third-party service provider who hosts the Products on your behalf in a public cloud, and will deploy the Products only in the operating environment specified on the order. If the “Cloud Platform for AWS” operating environment is specified on the order, you may deploy the Products listed on the order solely in an Amazon Web Services environment, except for any Products which technically require deployment in a different operating environment. If the “Cloud Platform for Azure” operating environment is specified on the order, you may deploy the Products listed on the order solely in a Microsoft Azure environment, except for any Products which technically require deployment in a different operating environment. 4. 部署方式。您只能在代表您于公共云中托管产品的第三方服务提供商控制的服务器或工作站上安装产品,并且您将只在订单指定的操作环境中部署产品。如果订单上指定了“Cloud Platform for AWS”操作环境,您仅可以在Amazon Web Services 环境中部署订单上所列之产品,因技术要求必须被部署在其他操作环境中的产品除外。 如果订单上指定了“Cloud Platform for Azure”操作环境,则您仅可以在 Microsoft Azure 环境中部署订单上所列之产品,因技术要求必须被部署在其他操作环境中的产品除外。
Measurement method An isolation resistance test instrument is connected between the live parts and the electrical chassis. The isolation resistance is subsequently measured by applying a DC voltage at least half of the working voltage of the high voltage bus. If the system has several voltage ranges (e.g. because of boost converter) in conductively connected circuit and some of the components cannot withstand the working voltage of the entire circuit, the isolation resistance between those components and the electrical chassis can be measured separately by applying at least half of their own working voltage with those components disconnected.
ICE Method The method used to calculate One-Month LIBOR, as described in Section 3.05.
Procurement Method (a) Quality-Based Selection (b) Selection under a Fixed Budget
Billing Method 1.5.1 To receive payment for services rendered under this contract, the Contractor shall submit a fully completed invoice for work previously performed to: Minneapolis Public Housing Authority Attention: Accounts Payable, Suite 307 0000 Xxxxxxxxxx Xxx X, Xxxxxxxxxxx, XX 00000 or: xxxxxxxx@xxxxxxx.xxx
System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.