FIBER OPTIC PERIMETER ANTI-INTRUSION SYSTEM Sample Clauses

FIBER OPTIC PERIMETER ANTI-INTRUSION SYSTEM. The security system is a 24 hour-a-day fiber optic perimeter system , which provides protection from intruders from within the protected area. It uses fiber optic technology for sensors and as a support element for the transmission of the alarm. Since the fiber optic line is made of glass and an internal light (not electrical)signal passes down the same, , the system is 100% reliable as an alarm signal. The system is not affected by bad weather (hail, thunderstorms, fog, sun, rain), wind (there is no wind effect), magnetic fields or electrical interference from radio frequencies, or vibrations of any kind. Finally, birds do not cause false alarms because the system, through the management software, deletes all optical stress points, by continually reading an average of the signals arising from the fiber optics. The perimeter fiber optical system is composed of: - Central FOSE microprocessor that runs from 1 to 8 transponders - Optical protection in the field - Support poles for the system with taut strings - Fiber optic link between central microprocessor and alarm zones. PICS ® 7.2 Each network consists of a control unit and area microprocessor controllers which are connected to sensors (PICS-node). The PICS-node consists of an electronic circuit of small size, protected from weathering by a coating of acrylic / polyurethane resin and fixed permanently on the back of each photovoltaic module. Depending on the manufacturer and the process for mounting, the attachment of the PICS-node will be ensured by a safety bolt and / or a two-component epoxy adhesive that once dried crystallizes and makes it impossible to remove. PICS-Each sensor node contains an identification code that resides on a 64-bit nonvolatile memory (lasered ROM). The sensors are electrically connected together with bus cable thus forming areas. The electrical connection of the cables is by a crimped termination in heat-shrunk nylon that ensures resistance to weathering. Each area is connected to a microprocessor called the "area controller" which is housed in the field frame for the Tracker installations while for the Radiantes it is necessary to use one dedicated frame fixed to the poles of the structure. File: R.01 - Technical report - Radiant 36 - Xxxxxxxxxx Project for a photovoltaic power plant equal to 734.40 kWp The microprocessor checks the status of the PICS-nodes and in case of damage or tampering transmits an alarm signal via wireless or RS485 control unit. In turn, the control u...
AutoNDA by SimpleDocs

Related to FIBER OPTIC PERIMETER ANTI-INTRUSION SYSTEM

  • DTC DIRECT REGISTRATION SYSTEM AND PROFILE MODIFICATION SYSTEM (a) Notwithstanding the provisions of Section 2.4 of the Deposit Agreement, the parties acknowledge that DTC’s Direct Registration System (“DRS”) and Profile Modification System (“Profile”) apply to the American Depositary Shares upon acceptance thereof to DRS by DTC. DRS is the system administered by DTC that facilitates interchange between registered holding of uncertificated securities and holding of security entitlements in those securities through DTC and a DTC participant. Profile is a required feature of DRS that allows a DTC participant, claiming to act on behalf of an Owner of American Depositary Shares, to direct the Depositary to register a transfer of those American Depositary Shares to DTC or its nominee and to deliver those American Depositary Shares to the DTC account of that DTC participant without receipt by the Depositary of prior authorization from the Owner to register that transfer.

  • System and Data Access Services a.System. Subject to the terms and conditions of this Addendum and solely for the purpose of providing access to Fund Data as set forth herein, State Street hereby agrees to provide the Fund, or certain third parties approved by State Street that serve as the Fund`s investment advisors, investment managers or fund accountants (the "Fund Accountants") or as the Fund`s independent auditors (the "Auditor"), with access to State Street`s Multicurrency HORIZONR Accounting System and the other information systems described in Attachment A (collectively, the "System") on a remote basis solely on the computer hardware, system software and telecommunication links described in Attachment B (the "Designated Configuration") or on any designated substitute or back-up equipment configuration consented to in writing by State Street, such consent not to be unreasonably withheld.

  • Information Systems (a) The MA Organization must:

  • Infrastructure (a) The Borrower has and will maintain a sufficient infrastructure to conduct its business as presently conducted and as contemplated to be conducted following its execution of this Agreement.

  • Environment, Health, and Safety (i) The Seller, and its predecessors and Affiliates has complied with all Environmental, Health, and Safety Laws, and no action, suit, proceeding, hearing, investigation, charge, complaint, claim, demand, or notice has been filed or commenced against any of them alleging any failure so to comply. Without limiting the generality of the preceding sentence, each of the Seller, and its predecessors and Affiliates has obtained and been in compliance with all of the terms and conditions of all permits, licenses, and other authorizations which are required under, and has complied with all other limitations, restrictions, conditions, standards, prohibitions, requirements, obligations, schedules, and timetables which are contained in, all Environmental, Health, and Safety Laws.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.

  • USE OF THIRD PARTY SYSTEMS-LEVEL SOFTWARE State Street and the Fund acknowledge that in connection with the Data Access Services provided under this Addendum, the Fund will have access, through the Data Access Services, to Fund Data and to functions of State Street’s proprietary systems; provided, however that in no event will the Fund have direct access to any third party systems-level software that retrieves data for, stores data from, or otherwise supports the System.

  • Environmental, Health and Safety The Policy Board shall review, approve and monitor environmental and workplace health and safety guidelines, the goal of which is to achieve compliance with current national, state and local laws and regulations regarding environmental and workplace health and safety.

Time is Money Join Law Insider Premium to draft better contracts faster.