Image Overlay/Data Fusion Module Sample Clauses

Image Overlay/Data Fusion Module. Objective · To develop a module which will be capable of merging into one image at 30 Hz a minimum of 4 full XGA size (1024x768) raster images from either internal or external sources.
AutoNDA by SimpleDocs

Related to Image Overlay/Data Fusion Module

  • Monthly Data Download Not later than fifteen (15) days after the end of each month, beginning with the month in which the Commencement Date occurs and ending with the Final Shared-Loss Month, Assuming Institution shall provide Receiver:

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • API A. Reliant shall supply to Cardinal Health for Manufacturing and Packaging, at Reliant’s sole cost, the API and applicable reference standards in quantities sufficient to meet Reliant’s requirements for each Product as further set forth in Article 4. Prior to delivery of any of the API or reference standard to Cardinal Health for Manufacturing and Packaging, Reliant shall provide to Cardinal Health a copy of the API Material Safety Data Sheet (“MSDS”), as amended, and any subsequent revisions thereto. Reliant shall supply the API, reference standards, and Certificate of Analysis FOB the Facility no later than thirty (30) days before the scheduled Manufacture Date upon which such API will be used by Cardinal Health. Upon receipt of the API, Cardinal Health shall conduct identification testing of the API. Cardinal Health shall use the API solely and exclusively for Manufacturing and Packaging under this Agreement. The maximum volume of API that Reliant supplies to Cardinal Health shall not exceed the amount reflected in the Firm Commitment and the next six (6) months of the Rolling Forecast.

  • Changes in Equipment, Systems, Etc USBFS reserves the right to make changes from time to time, as it deems advisable, relating to its systems, programs, rules, operating schedules and equipment, so long as such changes do not adversely affect the services provided to the Trust under this Agreement.

  • Access Control Landlord shall be the sole determinant of the type and amount of any access control or courtesy guard services to be provided to the Project, if any. IN ALL EVENTS, LANDLORD SHALL NOT BE LIABLE TO TENANT, AND TENANT HEREBY WAIVES ANY CLAIM AGAINST LANDLORD, FOR (I) ANY UNAUTHORIZED OR CRIMINAL ENTRY OF THIRD PARTIES INTO THE PREMISES, THE BUILDING OR THE PROJECT, (II) ANY DAMAGE TO PERSONS, OR (III) ANY LOSS OF PROPERTY IN AND ABOUT THE PREMISES, THE BUILDING OR THE PROJECT, BY OR FROM ANY UNAUTHORIZED OR CRIMINAL ACTS OF THIRD PARTIES, REGARDLESS OF ANY ACTION, INACTION, FAILURE, BREAKDOWN, MALFUNCTION AND/OR INSUFFICIENCY OF THE ACCESS CONTROL OR COURTESY GUARD SERVICES PROVIDED BY LANDLORD, IF ANY. Tenant shall provide such supplemental security services and shall install within the Premises such supplemental security equipment, systems and procedures as may reasonably be required for the protection of its employees and invitees, provided that Tenant shall coordinate such services and equipment with any security provided by Landlord. The determination of the extent to which such supplemental security equipment, systems and procedures are reasonably required shall be made in the sole judgment, and shall be the sole responsibility, of Tenant. Tenant acknowledges that it has neither received nor relied upon any representation or warranty made by or on behalf of Landlord with respect to the safety or security of the Premises or the Project or any part thereof or the extent or effectiveness of any security measures or procedures now or hereafter provided by Landlord, and further acknowledges that Tenant has made its own independent determinations with respect to all such matters.

  • Quality Service Standards/NAV Errors Price Associates and the Fund may, from time to time, agree to certain quality service standards, with respect to the Services hereunder. In the event Price Associates is the party responsible for causing an error in the computation of the net asset value for a Fund or share class of a Fund (“NAV Error”), the actions that are required to be taken as to such NAV Error shall be made in accordance with the Fund’s Net Asset Value Error Correction Policy and Procedures (“NAV Error Policy”) attached hereto as Schedule II.

  • Data Loss Prevention Transfer Agent shall implement a data leakage program that is designed to identify, detect, monitor and document Fund Data leaving Transfer Agent’s control without authorization in place.

  • Year 2000 Compatibility Borrower shall take all action necessary to assure that Borrower's computer based systems are able to operate and effectively process data including dates on and after January 1, 2000. At the request of Bank, Borrower shall provide Bank assurance acceptable to Bank of Borrower's Year 2000 compatibility.

  • Product Changes IDSI reserves the right to make design and other modifications in the Equipment at any time but shall not be obligated to implement such modifications in Equipment that has previously been delivered.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

Time is Money Join Law Insider Premium to draft better contracts faster.