Policy-based Routing Sample Clauses

Policy-based Routing. Narrative A particular gaming service requires an end-to-end latency of not more than 5ms and at least 1Mbps throughput in order to ensure no perceptible differences in the application used on the end users’ devices. Due to the constraints, several instances of the game service have been placed throughout the network in order to guarantee the performance requirements. When users attach at a new PoA the underlying system selects the service instances which meet the requirements and routes the service flows according to the set policies. Stakeholders  Media service providers defining the network requirements for their service to work flawlessly.  Platform provider translating the requirements into actions based on real-time performance information from the switching fabric, the service endpoints and about the achieved end to end QoS.  Infrastructure providers to provide virtual compute and storage facilities to instantiate several service instances.
AutoNDA by SimpleDocs

Related to Policy-based Routing

  • Standard Service Features Ethernet Access allows Customer to terminate single and/or multiple Ethernet Virtual Circuits (EVCs) from Customer equipment onto a single Ethernet Access UNI.

  • INTERNET-BASED SERVICES Microsoft provides Internet-based services with the software. It may change or cancel them at any time.

  • Switching System Hierarchy and Trunking Requirements For purposes of routing ECI traffic to Verizon, the subtending arrangements between Verizon Tandem Switches and Verizon End Office Switches shall be the same as the Tandem/End Office subtending arrangements Verizon maintains for the routing of its own or other carriers’ traffic (i.e., traffic will be routed to the appropriate Verizon Tandem subtended by the terminating End Office serving the Verizon Customer). For purposes of routing Verizon traffic to ECI, the subtending arrangements between ECI Tandem Switches and ECI End Office Switches shall be the same as the Tandem/End Office subtending arrangements that ECI maintains for the routing of its own or other carriers’ traffic.

  • Local Circuit Switching Capability, including Tandem Switching Capability 4.2.1 Local circuit switching capability is defined as: (A) line-side facilities, which include, but are not limited to, the connection between a loop termination at a main distribution frame and a switch line card; (B) trunk-side facilities, which include, but are not limited to, the connection between trunk termination at a trunk-side cross-connect panel and a switch trunk card; (C) switching provided by remote switching modules; and (D) all features, functions, and capabilities of the switch, which include, but are not limited to: (1) the basic switching function of connecting lines to lines, line to trunks, trunks to lines, and trunks to trunks, as well as the same basic capabilities made available to BellSouth’s customers, such as a telephone number, white page listings, and dial tone; and (2) all other features that the switch is capable of providing, including but not limited to customer calling, customer local area signaling service features, and Centrex, as well as any technically feasible customized routing functions provided by the switch. Any features that are not currently available but are technically feasible through the switch can be requested through the BFR/NBR process.

  • Location Based Services The Software's location based services (“LBS”) can be used with Devices that are equipped with a GPS receiver or devices that utilize cellular based location capabilities. The LBS feature in the Software is powered by Microsoft's Bing Maps technology. The Terms of Use and Privacy Statement for Microsoft’s Bing Maps technology may be accessed at: xxxx://xxx.xxxxxxxxx.xxx/maps/assets/docs/terms.aspx; xxxx://xxxxxxx.xxxxxxxxx.xxx/en- us/default.mspx . In order to access this third-party system, the product registration code is passed from the Software to the SOTI and/or its suppliers LBS Server, which in turn requests a non-identifying token from Microsoft’s Bing Maps service on behalf of the end user.

  • System Access CUSTOMER agrees to provide to PROVIDER, at CUSTOMER’S expense, necessary access to the mainframe computer and related information technology systems (the “System”) on which CUSTOMER data is processed during the times (the “Service Hours”) specified in the PSAs, subject to reasonable downtime for utility outages, maintenance, performance difficulties and the like. In the event of a change in the Service Hours, CUSTOMER will provide PROVIDER with at least fifteen (15) calendar days written notice of such change.

  • Misuse of Internet-based Services You may not use these services in any way that could harm them or impair anyone else’s use of them. You may not use the services to try to gain unauthorized access to any service, data, account or network by any means.

  • Originating Switched Access Detail Usage Data A category 1101XX record as defined in the EMI Telcordia Practice BR-010-200- 010.

  • System Access Control Data processing systems used to provide the Cloud Service must be prevented from being used without authorization. Measures: • Multiple authorization levels are used when granting access to sensitive systems, including those storing and processing Personal Data. Authorizations are managed via defined processes according to the SAP Security Policy • All personnel access SAP’s systems with a unique identifier (user ID). • SAP has procedures in place so that requested authorization changes are implemented only in accordance with the SAP Security Policy (for example, no rights are granted without authorization). In case personnel leaves the company, their access rights are revoked. • SAP has established a password policy that prohibits the sharing of passwords, governs responses to password disclosure, and requires passwords to be changed on a regular basis and default passwords to be altered. Personalized user IDs are assigned for authentication. All passwords must fulfill defined minimum requirements and are stored in encrypted form. In the case of domain passwords, the system forces a password change every six months in compliance with the requirements for complex passwords. Each computer has a password-protected screensaver. • The company network is protected from the public network by firewalls. • SAP uses up–to-date antivirus software at access points to the company network (for e-mail accounts), as well as on all file servers and all workstations. • Security patch management is implemented to provide regular and periodic deployment of relevant security updates. Full remote access to SAP’s corporate network and critical infrastructure is protected by strong authentication.

  • Constructability Program 5.2.1 Implement and conduct a constructability program to identify and document Project cost and schedule savings opportunities. The constructability program shall follow accepted industry practices and be reviewed by Owner at design milestones. Whenever the term “value engineering” is used in conjunction with this Agreement or the Project, it has its commonly accepted meaning within the construction industry and does not imply the practice of professional engineering without a license. If any value engineering activities constitute the professional practice of engineering, then such activities shall be performed by an engineer licensed in Texas.

Time is Money Join Law Insider Premium to draft better contracts faster.