Dependability a) Requires constant supervision to perform daily routine correctly b) Occasionally misses necessary task c) Rarely misses necessary task and is reliable d) Outstanding reliability and job is always completed correctly
Geometric visibility The visibility of the illuminating surface, including its visibility in areas which do not appear to be illuminated in the direction of observation considered, shall be ensured within a divergent space defined by generating lines based on the perimeter of the illuminating surface and forming an angle of not less than 5° with the axis of reference of the headlamp.
Year 2000 Compatibility Take all actions necessary to assure the Borrower's computer based systems are able to operate and effectively process data on and after January 1, 2000. At the request of the Lender, the Borrower shall provide the Lender with assurance acceptable to the Lender that Borrower's computer systems have Year 2000 compatibility.
Constructability Review Prepare detailed interdisciplinary constructability review within Fourteen (14) days of receipt of the plans from the District that: 10.1.2.1.6.1 Ensures construction documents are well coordinated and reviewed for errors; 10.1.2.1.6.2 Identifies to the extent known, construction deficiencies and areas of concern; 10.1.2.1.6.3 Back-checks design drawings for inclusion of modifications; and 10.1.2.1.6.4 Provides the District with written confirmation that: 10.1.2.1.6.4.1 Requirements noted in the design documents prepared for the Project are consistent with and conform to the District's Project requirements and design standards. 10.1.2.1.6.4.2 Various components have been coordinated and are consistent with each other so as to minimize conflicts within or between components of the design documents.
Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.