Dependencies on other Base Stations Sample Clauses

Dependencies on other Base Stations. We show next the degradation profile for a base station A when a base station B fails to provide its telecommunication services (each row in the table below refers to the effect on the base sta- tion A). Table 30: Degradation profiles for the base stations with respect to unavailability of telecommuni- cation services provided by other base stations. ID Time thalf for 50% operativeness (hours) Slope k Final operative level σ A,B,min BS1 9,30 3,39 0,07 BS2 9,03 2,25 0,09 BS3 10,71 4,17 0,09 BS4 8,71 4,54 0,10 BS5 9,58 4,75 0,14 BS6 9,38 3,34 0,11 BS7 9,47 2,45 0,10 BS8 11,00 3,32 0,10 BS9 8,84 6,91 0,07 BS10 8,73 2,43 0,10 BS11 8,33 4,16 0,09 BS12 8,78 4,51 0,10 BS13 10,4 4,59 0,10 BS14 8,80 4,15 0,12 BS15 8,00 5,32 0,15 BS16 7,76 3,51 0,09 BS17 9,78 5,39 0,12 BS18 10,84 3,46 0,11 BS19 10,37 3,30 0,08 BS20 10,35 4,17 0,12 BS21 7,34 3,55 0,10 BS22 10,62 3,98 0,06 BS23 9,44 5,22 0,12 BS24 7,48 3,59 0,11 BS25 11,38 3,41 0,13 BS26 11,03 3,52 0,10 BS27 9,94 4,32 0,11 BS28 8,53 4,13 0,08 BS29 10,48 3,95 0,08 BS30 9,80 5,18 0,11 BS31 9,43 2,83 0,09 BS32 9,09 3,54 0,12 BS33 12,89 4,30 0,08 BS34 9,24 5,26 0,11 BS35 10,46 3,22 0,08
AutoNDA by SimpleDocs

Related to Dependencies on other Base Stations

  • MANAGEMENT OF EVALUATION OUTCOMES 11.1 The evaluation of the Employee’s performance will form the basis for rewarding outstanding performance or correcting unacceptable performance.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Business Continuity Registry Operator shall maintain a business continuity plan, which will provide for the maintenance of Registry Services in the event of an extraordinary event beyond the control of the Registry Operator or business failure of Registry Operator, and may include the designation of a Registry Services continuity provider. If such plan includes the designation of a Registry Services continuity provider, Registry Operator shall provide the name and contact information for such Registry Services continuity provider to ICANN. In the case of an extraordinary event beyond the control of the Registry Operator where the Registry Operator cannot be contacted, Registry Operator consents that ICANN may contact the designated Registry Services continuity provider, if one exists. Registry Operator shall conduct Registry Services Continuity testing at least once per year.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

  • Procurement of Small Works Works estimated to cost less than $50,000 equivalent per contract, up to an aggregate amount not to exceed $500,000 equivalent, may be procured under lump-sum, fixed-price contracts awarded on the basis of quotations obtained from three (3) qualified domestic contractors in response to a written invitation. The invitation shall include a detailed description of the works, including basic specifications, the required completion date, a basic form of agreement acceptable to the Association, and relevant drawings, where applicable. The award shall be made to the contractor who offers the lowest price quotation for the required work, and who has the experience and resources to complete the contract successfully. Part D: Review by the Association of Procurement Decisions

  • Verizon OSS Facilities Any gateways, interfaces, databases, facilities, equipment, software, or systems, used by Verizon to provide Verizon OSS Services to CBB.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing iNetworks traffic to Verizon, the subtending arrangements between Verizon Tandems and Verizon End Offices shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to iNetworks, the subtending arrangements between iNetworks Tandems and iNetworks End Offices shall be the same as the Tandem/End Office subtending arrangements that iNetworks maintains for the routing of its own or other carriers’ traffic.

  • RESERVATIONS TO MANAGEMENT 3.01 The union recognizes the right of the company to hire, promote, demote, transfer, discipline, suspend or discharge any employee subject to such regulations and restrictions governing the exercise of these rights as are expressly provided in this agreement and subject to the right of the employee concerned to lodge a grievance in the manner and to the extent herein provided. Any change in rules and regulations to be observed by employees shall be negotiated by the parties.

Time is Money Join Law Insider Premium to draft better contracts faster.