Transcoding (XCD Sample Clauses

The Transcoding (XCD) clause defines the rights and obligations related to converting digital content from one format to another, specifically using the XCD standard. In practice, this clause outlines who is permitted to perform transcoding, under what conditions, and may specify technical requirements or quality standards for the resulting files. Its core function is to ensure that content can be adapted for different platforms or devices while maintaining control over the process and protecting the interests of the content owner.
Transcoding (XCD. Additional capability to translate (e.g., MPEG2 to H.264), transrate (e.g., HD bitrate to Mobile bitrate), transcale (e.g., HD resolution to Mobile resolution), transcrypt (e.g., CAS to DRM), or perform audio format conversions (e.g., AC-3 to AAC) in real-time.
Transcoding (XCD. Additional capability to translate (e.g. MPEG2 to H.264), transrate (e.g. HD bitrate to Mobile bitrate), transcale (e.g. HD resolution to Mobile resolution), transcrypt (e.g. CAS to DRM), or perform audio format conversions (e.g. AC-3 to AAC) in real-time. 3 ▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/standards/ 4 ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/cablemodem/specifications/specifications20.html 5 ▇▇▇▇://▇▇▇.▇▇▇▇▇▇▇▇▇.▇▇▇/cablemodem/specifications/specifications30.html

Related to Transcoding (XCD

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • System Logging The system must maintain an automated audit trail which can 20 identify the user or system process which initiates a request for PHI COUNTY discloses to 21 CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY, 22 or which alters such PHI. The audit trail must be date and time stamped, must log both successful and 23 failed accesses, must be read only, and must be restricted to authorized users. If such PHI is stored in a 24 database, database logging functionality must be enabled. Audit trail data must be archived for at least 3 25 years after occurrence.

  • Network Interconnection Architecture Each Party will plan, design, construct and maintain the facilities within their respective systems as are necessary and proper for the provision of traffic covered by this Agreement. These facilities include but are not limited to, a sufficient number of trunks to the point of interconnection with the tandem company, and sufficient interoffice and interexchange facilities and trunks between its own central offices to adequately handle traffic between all central offices within the service areas at a P.01 grade of service or better. The provisioning and engineering of such services and facilities will comply with generally accepted industry methods and practices, and will observe the rules and regulations of the lawfully established tariffs applicable to the services provided.

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.