General Workflow Sample Clauses

General Workflow. ‌ The following indications are general and apply to all instances above. It is the responsibility of everybody to strive for each event to exceed expectations and meet the highest possible standards, as well as to disseminate the promotion materials and the dissemination materials.
AutoNDA by SimpleDocs
General Workflow. The Attestation Engine is responsible for establishing trustworthiness of the infrastructure and security services. This is obtained by applying trusted computing attestation to the platforms and Security Capabilities starting at the initial deployment through operation. The following figures describe the workflow of each phase of the attestation procedures performed by the Attestation Engine. Figure 2: Initial Attestation Workflow The initial attestation occurs each time a new instance of a given Security Capability is deployed. Figure 2 depicts the workflow for initial attestation of every new instance. The Security Capabilities Orchestration, which is in charge of the overall management of the security capabilities, notifies the Attestation Engine when a new instance of the Security Capability is deployed or when a new platform is introduced in the SCHI. The Attestation Engine performs remote attestation procedures on the SC to validate its state. The SCHI also assists with the integrity reports from the AE agent hosted in SCHI for verification. If the verification fails, the AE sends a failure response to the Recovery Service (RS) suggesting the SCO not to use that SC and to exclude it from the infrastructure. Figure 3: Periodic attestation Workflow In order to maintain the trustworthiness of the infrastructure and services, the Attestation Engine performs periodic runtime attestations after the initial attestation as interpreted in Figure 3. The SCHI periodically notifies infrastructure topology updates to the Attestation Engine to keep the AE aware of the latest topology of the infrastructure. The infrastructure topology is iterated periodically per node and SC. If the verification fails at any time, the Attestation Engine sends a failed attestation notification to the RS. The failed attestation notification is also forwarded to Threat Intelligence for further analysis.
General Workflow. The general workflow of the IR component is presented in Figure 9, where two different scenarios and two differently modelled FSMs are triggered by the TI. • In the first scenario S1, a data breach detected by TI is triggering the FSM1, which alerts the user in the PALANTIR Portal about the detected data breach. Shortly after, the IR starts running the service defined for the detected incident (e.g. Data Backup) and notifies the user again about the action performed. • In the second scenario S2, a data breach detected by TI is triggering the FSM2, which asks for user intervention through service reconfiguration and awaits user response. Once the confirmation is received from the user about the reconfiguration, the IR component refines the response policy with the RR in the TI. Then the IR deploys the recommended service, gets the information back from the SCO and finally can send the notification to the Portal.

Related to General Workflow

  • ELECTRONIC WORKFLOW SYSTEM OGS reserves the right to incorporate an electronic workflow system that may include elements of the Authorized User RFQ process. OGS reserves the right to post Authorized User Contract usage of Centralized Contracts. TRAVEL, MEALS AND LODGING - LOT 4 – IMPLEMENTATION ONLY For Lot 4 only, when provided for in the RFQ and resultant Authorized User Agreement, the Authorized Users may reimburse travel expenses. All rules and regulations associated with this travel can be found at xxxx://xxx.xxxxx.xx.xx/agencies/travel/travel.htm. In no case will any travel reimbursement be charged that exceeds these rates. All travel will be paid only as specified within the Authorized User Agreement and must be billed with the associated services on the same Invoice with receipts attached. The Contractor shall receive prior approval from the Authorized User for any travel that occurs during the term of an Authorized User Agreement. Parking fees and/or parking tickets shall not be paid by an Authorized User. Unless otherwise specified in writing by the Authorized User, a vehicle will not be provided by Authorized User to the Contractor for travel. Therefore, the Contractor will be responsible for ensuring that the Contractor has access to an appropriate vehicle (e.g., personal vehicle or rental vehicle) or common carrier with which to carry out any necessary travel. For the Contractor to obtain reimbursement for the use of a rental vehicle, such use must be justified as the most cost- effective mode of transportation under the circumstances (including consideration of the most effective use of time). The Contractor is responsible for keeping adequate records to substantiate any claims for travel reimbursement. All services provided under the resultant Authorized User Agreement must be performed within CONUS. PERFORMANCE AND BID BONDS There are no BONDS for this Contract. However, an Authorized User may require in an RFQ a performance, payment or Bid bond, or negotiable irrevocable letter of credit or other form of security for the faithful performance for the resultant Authorized User Agreement. CONTRACTOR REQUIREMENTS AND PROCEDURES FOR PARTICIPATION BY NEW YORK STATE CERTIFIED MINORITY- AND WOMEN-OWNED BUSINESS ENTERPRISES AND EQUAL EMPLOYMENT OPPORTUNITIES FOR MINORITY GROUP MEMBERS AND WOMEN I. New York State Law Pursuant to New York State Executive Law Article 15-A and Parts 140-145 of Title 5 of the New York Codes, Rules and Regulations (“NYCRR”), the New York State Office of General Services (“OGS”) is required to promote opportunities for the maximum feasible participation of New York State-certified Minority- and Women-owned Business Enterprises (“MWBEs”) and the employment of minority group members and women in the performance of OGS contracts.

  • Schematic Design Phase Services § 3.2.1 The Architect shall review the program and other information furnished by the Owner, and shall review laws, codes, and regulations applicable to the Architect’s services.

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.

  • Construction Phase Services 3.1.1 – Basic Construction Services

  • General specifications 6.1.1. A vehicle and its electrical/electronic system(s) or ESA(s) shall be so designed, constructed and fitted as to enable the vehicle, in normal conditions of use, to comply with the requirements of this Regulation.

  • Software Use Case Red Hat Enterprise Virtualization Supported on physical hardware solely to support virtual quests. Red Hat Enterprise Virtualization is designed to run and manage virtual instances and does not support user-space applications. Red Hat Enterprise Virtualization may be used as a virtual desktop infrastructure solution, however, the Subscription does not come with any software or support for the desktop operating system. You must purchase the operating system for each instance of a desktop or server separately.

  • Scope of Work and Deliverables 9.1 Background and Scope

  • Design Phase Services § 3.2.1 The Architect shall review the program and other information furnished by the Owner, and shall review laws, codes, and regulations applicable to the Architect’s services.

  • Configuration Management The Contractor shall maintain a configuration management program, which shall provide for the administrative and functional systems necessary for configuration identification, control, status accounting and reporting, to ensure configuration identity with the UCEU and associated cables produced by the Contractor. The Contractor shall maintain a Contractor approved Configuration Management Plan that complies with ANSI/EIA-649 2011. Notwithstanding ANSI/EIA-649 2011, the Contractor’s configuration management program shall comply with the VLS Configuration Management Plans, TL130-AD-PLN-010-VLS, and shall comply with the following:

  • General Scope of Work The Scope of Work and projected level of effort required for these SERVICES is described in Exhibit “A” attached hereto and by this reference made a part of this AGREEMENT. The General Scope of Work was developed utilizing performance based contracting methodologies.

Time is Money Join Law Insider Premium to draft better contracts faster.