Network Environment Sample Clauses

Network Environment. St Brigid’s school has created extensive networks with staff and student information, curriculum resources, telephone and digital technology resources for staff and student use. These resources are provided to allow you and others to perform your tasks effectively in meeting the goals and needs of the school. The school computer network is a work tool and must be treated by you with the same respect and care shown to any school resource. Improper use of any of these resources can cause problems related to the needs of some or all employees and students in the school. You may not attempt to maliciously alter, erase, damage, destroy or make otherwise unusable or inaccessible any data, software, computer, or network system.
AutoNDA by SimpleDocs
Network Environment. For cost effectiveness, Contractor may propose using MTD’s existing IT systems for the AIM data network system including the fiber optic network between Olive Terminal buildings and between Olive Terminal and the Transit Center. Such usage would be contingent upon not negatively impacting the performance or functionality of either the existing MTD or the AIM System. MTD’s existing server technologies are Windows DataCenter Server 2008 and Windows DataCenter Server 2012. The virtual server technology used is Microsoft HyperV. There are two physical servers running about 8 guests each. These are Supermicro 7046A-3 4U systems with two E5520 Xeon processors each. These provide 16 CPUs each which typically run at about 10% utilization under normal loads. Each system has 48GB of memory with a little over half of that used under normal loads. Each server has a 3TB array of 6Gb/sec SAS storage. Each server has two Gigabit network cards. MTD is using 10% to 20% of the cores on a normal basis. Utilization moves up to 50% during some tasks. About 20GB of RAM is typically available for use. Available disk space is approx 1.5TB. We do not use redundant cores, drives, etc. Our systems currently do not require 24/7 uptime. The servers are redundant. If one fails, we can move guests to the other using our continuous backup. We have replacement parts on hand. No specialized system monitoring software. One of our consultants uses Kayseya agents to monitor our systems. The SAN is a Hitachi AMS 2500 with 1TB of SATA storage and 3TB of SAS storage. This system is expandable. Contractor would need to provide additional storage for their applications. An expansion unit would be required.
Network Environment. The County has a mature enterprise level infrastructure and network. The County has an integrated data network comprised of 1 GB and higher Ethernet switches. The data network uses multiple T1 and DS3 lines tying numerous sites with various Cisco routers, hubs and UTP LAN’s. The fiber links from the outlying offices in Santa Xxxx to the main County Campus are provisioned by the local cable company. The County also has three AT&T Opt-E-Man fiber networks currently linking over 35 sites. Its network runs on Microsoft Windows Server 2003 Active Directory operating system. Application server and storage space is provided through a Storage Area Network. Although the County operates an IBM mainframe computer to support its financial systems, it is actively in the process of moving applications to a server Any proposed solution must be able to operate on a VMware virtual server environment and be Windows 7 certified for client use. Additional information about the Sonoma County IT Environment can be found in Attachment G.
Network Environment. A user license is required for each computer on which the software is installed. An additional license is required for each user using the software through Windows Terminal Server. A server license is required for each server location. You may install and activate a copy of the software on a secondary computer (e.g. laptop) for your exclusive use or that of your accountant, provided that this copy is not used in a networked environment. The Dynacom Accounting SMB Edition is limited to 9 user licenses.
Network Environment. As the network technology continues to grow at a high rate of speed, Mobile Ad hoc NETwork (MANET) [2][16] has enjoyed an amazing rise in popularity. MANET, consisting of wireless processors that communicate with each other in the absence of a fixed infrastructure, is different from the traditional network structures. Its topology, as shown in Fig. 1, can be modeled as a unit-disk graph [2] according to the range of transmission power of the members of the network. Besides, the MANET can easy to be used flexibly and quickly in automated battlefields, disaster relief, and rescue. There exist several challenges to the MANET due to its dynamic nature, such as low battery power, limited bandwidth, and unrestraint mobility. However, traditional routing protocols included hierarchical routing, link state, and distance vector [13][16] need to be reinvestigated. The previous routing path is destroyed when the processors immigrate into or emigrate out of the network at any time. Therefore, some research [2][13] has proposed a concept of a virtual backbone for organizing the MANET and classifying processors as gateway or non-gateway processors. In this hierarchical topology, one gateway processor can handle non-gateway processors in its own group and the routing process is simplified with respect to gateway processors. Namely, only gateway processors need to maintain the routing table and the search space is reduced to itself. Non-gateway processors can also change their status to sleep mode to conserve their battery power. Therefore, the virtual backbone is being adapted for organize a MANET. The Connected Dominating Set (CDS) is a popular algorithm proposed by Wu and Li [16], to build the virtual backbone of a MANET. The CDS-based virtual backbone is related to the concept of dominating in graph theory. A subset of vertices on a graph is a dominating set if every vertex not in the subset is adjacent to at least one vertex in the subset. Therefore, the processors of the dominating set should be connected for building the routing path of transmission. Subsequently, the algorithm removes all locally redundant gateway processors during the re-marking phase to obtain a minimal CDS. Das et al. [2], proposed another famous distributed algorithm to build a virtual backbone. Their algorithm first finds an approximation to the minimum dominating set by a greedy algorithm; and then, in the second stage, constructs a spanning forest F. Subsequently, the third stage expands th...

Related to Network Environment

  • Work Environment It is mutually agreed that the prevention of accidents and injuries to state employees will result in greater efficiency of operations of state government. Toward this end, the Employer shall make every reasonable effort to provide and maintain safe and healthy working conditions and the Union shall fully cooperate by encouraging all employees to perform their assigned tasks in a safe manner.

  • Safe Environment The School shall maintain a safe learning environment at all times. The School shall develop and adhere to a safety plan, which shall be provided to the Commission.

  • NON-SEXIST ENVIRONMENT 1. A non-sexist environment is defined as that in which there is no discrimination against females or males by portraying them in gender stereotyped roles or by omitting their contributions.

  • Working Environment The Parties agree that a safe and clean working environment is essential in order to carry out work assignments in a satisfactory manner. It will be the Employer's responsibility to ensure that all working areas and Employer-owned vehicles are maintained in a safe and clean condition.

  • Health, Safety and Environment 41.1 In the performance of this Contract, Contractor and Operator shall conduct Petroleum Operations with due regard to health, safety and the protection of the environment (“HSE”) and the conservation of natural resources, and shall in particular:

  • Management of Special and Technical Environment Each certificated support person demonstrates an acceptable level of performance in managing and organizing the special materials, equipment and environment essential to the specialized programs.

  • Environment 1. Recognising the right of each Contracting Party to establish its own levels of domestic environmental protection and environmental development policies and priorities, and to adopt or modify accordingly its environmental legislation, each Contracting Party shall strive to ensure that its legislation provide for high levels of environmental protection and shall strive to continue to improve this legislation.

  • Protection of the Environment 14.1 The Government and the Contractor recognise that Petroleum Operations will cause some impact on the environment in the Contract Area. Accordingly, in performance of the Contract, the Contractor shall conduct its Petroleum Operations with due regard to concerns with respect to protection of the environment and conservation of natural resources and shall in particular;

  • O.S.H.A. and Environmental Compliance (a) Each Borrower has duly complied with, and its facilities, business, assets, property, leaseholds, Real Property and Equipment are in compliance in all material respects with, the provisions of the Federal Occupational Safety and Health Act, the Environmental Protection Act, RCRA and all other Environmental Laws; there have been no outstanding citations, notices or orders of non-compliance issued to any Borrower or relating to its business, assets, property, leaseholds or Equipment under any such laws, rules or regulations.

  • Least Restrictive Environment The Board and the Association acknowledge that the policy of least restrictive environment is legally mandated and intended in the best educational interest of the student. Accordingly, the parties who would fit legal requirements which would involve the use of an Individual Educational Planning Team (IEPT) for placement in the regular classroom must be appropriate to the student’s unique needs as determined by an IEP on an individual basis. For the purpose of this section, such students shall be referred to as “mainstreamed students.”

Time is Money Join Law Insider Premium to draft better contracts faster.