Usability Sample Clauses

Usability. Software applications must be modern, intuitive, and easy to use. It should be built with accessibility (Web Content Accessibility Guidelines / Section 508) in mind. Layouts and features should remain simple, consistent throughout, and to the point.
AutoNDA by SimpleDocs
Usability. Installation Installation instructions are available and up-to-date in the wiki of the project documentation (xxxxx://xxxx.xxxxxxxxxxxx.xxx). Moreover, an installation guide can be downloaded with the software (xxxx://xxx.xxxxxxxxxxxx.xxx/software/downloads). Operative documentation A user guide can be downloaded along with the OpenDaylight release. Additionally, a starting guide is also available in the website (xxxx://xxx.xxxxxxxxxxxx.xxx/resources/getting-started-guide). Development Development documentation A wiki is available for developers at (xxxxx://xxxx.xxxxxxxxxxxx.xxx). It is a live document so it is updated periodically as long as the OpenDaylight project evolves. There is also a set of mailing lists and an IRC channel. Documentation for application development Refer to previous point. Development roadmap Refer to each project section in the OpenDaylight developers’ wiki (xxxxx://xxxx.xxxxxxxxxxxx.xxx/view/GettingStarted:Developer_Main). Also, several sample applications are developed. (xxxxx://xxxx.xxxxxxxxxxxx.xxx/view/OpenDaylight_Controller:Sample_Applications) Toolchain Java 1.7 + Maven + OSGi IDE integration As reported in the wiki of the project (xxxxx://xxxx.xxxxxxxxxxxx.xxx/view/GettingStarted:_Eclipse), at present only the Controller and the OpenFlow plugin projects have been validated to import into Eclipse without compile errors. Deployment System requirements OpenDaylight Controller runs in a JVM. Being a Java application, it can potentially run on any operating system that supports Java. However, for best results a recent Linux distribution and Java 1.7 are recommended. The only information about system requirements for running the controller has been found is more than 1G RAM. Nonetheless, OpenDaylight provides a set of preconfigured VMs with the Hydrogen release of the controller installed. Such VMs contain a GNU/Linux Ubuntu server 13.04 distribution and recommend to allocate 4GB of RAM memory to run the controller. Although the OpenDaylight controller is developed as a normal Java project, it makes heavy use of the Xtend language in some places. While development is possible with bare tools, it is recommend to use Eclipse with the Xtend plugin. Reference target OS Recent Linux distribution is recommended although any OS running a Java 1.7 virtual machine should work. Runtime dependencies Java 1.7 Key features to support COSIGN extensions Supported OpenFlow OpenFlow versions 1.0 and 1.3 are supported. version Supported protocol...
Usability. ‌ Operator opens the Offload Application and adds a new task to the queue by selecting a bus and the time to be downloaded. Task is created with status “waiting for bus” on the queue status pane. • The bus will be selected from a drop down list that is updated every time a new SVR is registered to the Video Offload Service. Upon bus arrival to garage, video offload request is sent to the bus and video is downloaded to the center. Status bar shows “downloading” status with progress. If video is not available on the bus (elapsed retention time) or there is a problem writing to the garage server, an Error status will be shown in the status bar. When download is completed a new case is opened on Inform and status changes to “case ID is ready on Inform”. Correlation between offload queue and inform case will be by the case name (with reference on the queue manager to the Inform case name).
Usability. Tenant has inspected the Premises and fixtures (or has had the Premises inspected on behalf of Tenant), and acknowledges that the Premises are in a reasonable and acceptable condition of usability for their intended use, and the agreed rent payments are fair and reasonable. If the condition changes so that, in Tenant's opinion, the usability and rental value of the Premises are adversely affected, Tenant shall promptly provide reasonable notice to Landlord.
Usability. 7.1 You are using the SERVICES at your own risk and you are responsible for verifying its suitability for your needs. Use of the SERVICES does not guarantee a particular result or compliance with applicable law.
Usability. The Contractor’s System must be designed to provide a browser based, or a Rich Internet Application, that will utilize feature rich applications that will be updated over the Wide Area Network (WAN) and the Internet, and will deliver a consistent User experience to Vermont Citizens, AHS employees, providers, contractors, and partners. The Contractor will send and retrieve data in the background without interfering with or delaying User interface behavior in the browser. As newer browsers are released and are more capable of supporting technologies such as HTML5, the Contractor will capitalize on those improvements and incorporate them in the application. The Contractor’s System shall provide a dynamic Graphic User Interface (GUI) that allows access to information based on a User’s role and associated permissions. Configurable functions as well as the current state of User interaction at any given point in time will be achieved via configurable business rules or branching logic that is associated with real-time responses within the application. The Contractor’s System shall present only what is relevant to, or required of, the User to accomplish a specific data entry or review scenario while still ensuring all pertinent data is captured. All fields will include appropriate User entry validation such as data type, masking, and length. The Contractor will use zero footprint technology, architecture, and applications that can be “styled” or “skinned” to the AHS color palette and logo. The Contractor will provide secure single sign-on options to integrate into an existing client portal. Single Sign-On Options will include:
Usability. Providing a regular working system is not enough when it comes to a CIS. A CIS shall always be under control: “when running a CIS has to report on its state and to give evidence of its well being. It is mandatory to know how the CIS is working and what difficulties it encounters or has encountered”. It is preferable to check the CIS continuously in order to help ensure that it is well under control. This reporting information is valuable both:  For building a real time dashboard in order to detect earlier any possible deviation,  And “off-line” for calculating key quality of service indicators. This allows for example to relate the CIS performance with its capacity, and to know how it reacts to overloading or any unforeseen event. It also covers requirements related to traceability (e.g. audit trails, etc.). In addition, “a CIS can be easily managed without impacting the quality of service”:  Manipulations shall be risk-free (stopping/restarting the entire system and various components, etc.).  On-site presence of highly skilled personnel shall be as reduced as possible.
AutoNDA by SimpleDocs
Usability. Feedback errors found by ProB into the PO view (as red icons). • Improve disprover, detect when it is a decision procedure. • Allow the user to easier inspect elements of the animated model: the cause of errors, why events are not enabled, etc. • Further improvements to the GUI: 2-D Viewer, better multi-level animation view. References [1] xxxx://xxx.xxxxx.xxx-xxxxxxxxxxx.xx/~xxxxxxxx/publication_detail.php?id=253 [2] xxxx://xxxx0.xx.xxx-xxxxxxxxxxx.xx/trac/prob/wiki/ [3] xxxx://xxx.xxxxx.xxx-xxxxxxxxxxx.xx/~xxxxxxxx/publication_detail.php?id=248 [4] xxxx://xxx.xxxxx.xxx-xxxxxxxxxxx.xx/~xxxxxxxx/publication_detail.php?id=256 [5] xxxx://xxx.xxxxxxxxxxxx.xxx/content/282p2316x7165588/ [6] xxxx://xxx.xxxxx.xxx-xxxxxxxxxxx.xx/~xxxxxxxx/publication_detail.php?id=252 [7] xxxx://xxx.xxxxx.xxx-xxxxxxxxxxx.xx/publications_detail.php?id=219 [8] xxxx://xxx.xxxxx.xxx-xxxxxxxxxxx.xx/~xxxxxxxx/publication_detail.php?id=249 [9] xxxx://xxx.xxxxx.xxx-xxxxxxxxxxx.xx/~xxxxxxxx/publication_detail.php?id=257 [10] xxxx://xxx.xxxxx.xxx-xxxxxxxxxxx.xx/~xxxxxxxx/publication_detail.php?id=258 5 Text Editor Plug-In
Usability. The ALPKA 1 scheme cannot be made multiple use, as the proxy requires the knowledge of the combined secret information from solely the sender and the receiver for the re-encryption key. The ALPKA 2 scheme could allow multiple use if the construction of the key slightly changes. For instance, if K2 = H(Bi H(x) H(Ni)), i.e., if the information of the receiver is removed from the definition of the key. However, in this case, the sender does not have any control on who will receive the message, and thus this feature might not be very interesting. – Transitivity: As this feature involves a property on the proxy re-encryption key, it is only relevant for ALPKA 1. Transitivity is obtained as the re- encryption key combines the secret information of both sender and receiver by multiplication. Since the single secret information of one of the two is not known and cannot be extracted by combining multiple re-encryption keys from different pairs of senders and receivers, it is impossible to con- struct a new re-encryption key from this information. – Collusion resistant: First of all, a compromised proxy cannot generate new authorized entities, as the construction of the values Ai require the knowledge of the master key y of the KDC. Also a compromised node on itself is not able to decrypt messages (not intended to him). It is only able to derive the identity of the sender and the receiver from the transmitted messages. For the impact on the security when both a compromised proxy and entity collaborate, the two ALPKA schemes are discussed separately. – For the computation of K1 in ALPKA 1, the secret information of either sender or receiver is required. Suppose a malicious user collaborates with the proxy, it is only able to derive the messages sent by himself or sent to a particular receiver as the re-encryption key involves the secret information of both the sender and the receiver. For the transmission of information between other entities, their combined knowledge allows only to the malicious user to derive the identity of the sender and receiver as explained later, but cannot be exploited to decrypt their messages. – For the derivation of K2 in ALPKA 2, no individual secret information of the sender si or receiver sj is used. Its secrecy mainly depends on two types of values, which are asymmetrically divided among the entities and the proxy. First, there is the value H(x), which is shared among all authorized users and not the proxy. Second, there are also the i...
Usability. You are using the Services at your own risk and you are responsible for verifying its suitability for your needs. Use of the Service does not guarantee a particular result or compliance with applicable law.
Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!