Metadata gateway Sample Clauses

Metadata gateway. This is the user interface to be used by content providers for the ingestion [month 12] Schedule of relevant Milestones Milestone number 59 Milestone name Lead benefi- ciary number Delivery date from Annex I 60 Comments MS7 Xxxxxxxx ready for delivery of content to Europeana 7 12 this is the starting point for the beginning of mapping and delivery of metadara records to Europeana Project Number 1 270905 Project Acronym 2 Linked Heritage One form per Work Package Work package number 53 WP6 Work package title Coordination of Content Start month 6 End month 30 Lead beneficiary number 55 17 Objectives • To gather feedback for the refinement and improvement of the environment and the system as a whole, in order to support tier-one countries and others who have not yet contributed large amounts of content to Europeana • To provide support to the content providers for the mapping of their metadata formats to the Linked Heritage format • To contribute large amounts of enhanced content to Europeana, including private sector content Description of work and role of partners
AutoNDA by SimpleDocs

Related to Metadata gateway

  • Metadata Bibliographical, structural & descriptive data of the Licensed Material as defined in Schedule 5.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Web Hosting If Customer submits a Service Order(s) for web hosting services, the following terms shall also apply:

  • Access to Network Interface Device (NID 2.4.3.1. Due to the wide variety of NIDs utilized by BellSouth (based on subscriber size and environmental considerations), Mpower may access the on-premises wiring by any of the following means: BellSouth shall allow Mpower to connect its loops directly to BellSouth’s multi-line residential NID enclosures that have additional space and are not used by BellSouth or any other telecommunications carriers to provide service to the premise. Mpower agrees to install compatible protectors and test jacks and to maintain the protection system and equipment and to indemnify BellSouth pursuant to Section 8 of the General Terms and Conditions of this Agreement.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • End User An “End User” is you, an individual or entity, which receives the Models from Licensee or Authorized Licensee User pursuant to this End User Agreement to use in the regular course of your affairs, but not for resale, modification, distribution or exploitation by third parties without AnyLogic’s prior written consent.

  • Interfaces Bellcore’s GR-446-CORE defines the interface between the administration system and LIDB including specific message formats. (Bellcore’s TR-NWP-000029, Section 10)

  • Connectivity User is solely responsible for providing and maintaining all necessary electronic communications with Exchange, including, wiring, computer hardware, software, communication line access, and networking devices.

Time is Money Join Law Insider Premium to draft better contracts faster.