Remote Transmission Monitor (RTM Sample Clauses

Remote Transmission Monitor (RTM. The RTM shall receive the same audio messages used to activate programmable load control thermostats and digital control units (DCU) for load control. The RTM shall be capable of receiving outgoing messages from either a single transmitter or an entire transmitter network. The RTNI shall receive messages, decode the message and send it back to the Load Management System (LMS) for verification of the load control/’programming message. The RTM shall contain watchdog circuitry to eliminate lockups caused by transients and power surges. The RTM shall decode AFSK and FSK protocols at the same time.
AutoNDA by SimpleDocs

Related to Remote Transmission Monitor (RTM

  • Fund Designated Secured-Transmission Method Instructions may be transmitted through a secured or tested electro-mechanical means identified by the Fund or by an Authorized Person entitled to give Instruction and acknowledged and accepted by the Custodian, it being understood that such acknowledgment shall authorize the Custodian to accept such means of delivery but shall not represent a judgment by the Custodian as to the reasonableness or security of the means utilized by the Authorized Person.

  • Fax Transmission A facsimile, telecopy or other reproduction of this Amendment may be executed by one or more parties hereto, and an executed copy of this Amendment may be delivered by one or more parties hereto by facsimile or similar instantaneous electronic transmission device pursuant to which the signature of or on behalf of such party can be seen, and such execution and delivery shall be considered valid, binding and effective for all purposes. At the request of any party hereto, all parties hereto agree to execute an original of this Amendment as well as any facsimile, telecopy or other reproduction hereof.

  • Remote Access The ISP will restrict remote access to BNY Mellon systems to authorized users using multifactor authentication or equivalent safeguard, and will require such access to be logged.

  • Computer Transmission The Custodian is able to accept transmissions sent from the Fund’s computer facilities to the Custodian’s computer facilities. If the Fund determines to use its proprietary transmission or other electronic transmission method, it must provide Custodian sufficient notice and information to allow testing or other confirmation that FT Instructions received via the Fund Designated Security Procedure can be processed in good time and order. The Custodian may require the Fund to execute additional documentation prior to the use of such transmission method.

  • Data Protection During Transmission Transfer Agent shall encrypt, using an industry standard encryption algorithm, personally identifiable Fund Data when such data is transmitted.

  • Facsimile Transmission A FT Instruction transmitted to the Custodian by facsimile transmission must be transmitted by the Fund to a telephone number specified from time to time by the Custodian for such purposes. The Custodian will then follow one of the procedures below:

  • Counterparts; Facsimile Transmission This Agreement may be executed in separate counterparts, each of which is deemed to be an original and all of which taken together constitute one and the same agreement. Each party to this Agreement agrees that its own telecopied signature will bind it and that it accepts the telecopied signature of each other party to this Agreement.

  • TRANSMISSION OF SHARES 16.1 If a Member dies the survivor or survivors (where he was a joint holder) or his legal personal representatives (where he was a sole holder), shall be the only persons recognised by the Company as having any title to his Shares. The estate of a deceased Member is not thereby released from any liability in respect of any Share, for which he was a joint or sole holder.

  • Transmission The Custodian and the Fund shall comply with SWIFT’s authentication procedures. The Custodian will act on FT Instructions received via SWIFT provided the instruction is authenticated by the SWIFT system. § Written Instructions. Instructions may be transmitted in an original writing that bears the manual signature of an Authorized Person(s).

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

Time is Money Join Law Insider Premium to draft better contracts faster.