Pump Base Anchors Clause Samples

Pump Base Anchors. The pump base elbow is held in place by four anchor bolts consisting of a nut tightened onto a stud anchored into the concrete. If any of the anchor bolts are in need of replacement (as determined by the Design Engineer in consultation with the Contractor) they shall be 1” diameter by 12” minimum length stainless steel, with Hilti HIT-RE 500-SD two-part epoxy. These will be paid for out of the Contingency Allowance since the number of bolts that need replacing, if any, is not known.

Related to Pump Base Anchors

  • Porcupine Site Highway 11 and the City of Timmins Thunder Bay and District Toronto/York-Peel

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If WCS chooses to subtend a Verizon access Tandem, WCS’s NPA/NXX must be assigned by WCS to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 WCS shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from WCS’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office WCS utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow WCS’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Crane Erection & Jumping (a) Cranes and man/material hoists may be erected, altered, climbed and dismantled during times when ordinary production works are in progress subject to the work being done in full compliance with a relevant operational safety zone (OSZ) plan which has been developed specifically for that operation with consideration to overall site safety. (b) The crane crew for each tower crane (Crane Crew) must consist of the following: (i) crane driver; and (ii) three (3) dogmen. (c) In addition to the appropriate tickets held by the crane driver and the dogmen, the following high risk licences must be held amongst the Crane Crew: (i) rigging; and (ii) material handling. (d) Where a Project consists of a single Crane Crew, the Employer should endeavour to ensure another member of the Crane Crew holds a crane driver licence.

  • NO HARDSTOP/PASSIVE LICENSE MONITORING Unless an Authorized User is otherwise specifically advised to the contrary in writing at the time of order and prior to purchase, Contractor hereby warrants and represents that the Product and all Upgrades do not and will not contain any computer code that would disable the Product or Upgrades or impair in any way its operation based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral, or other similar self-destruct mechanisms (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices) or that would permit Contractor to access the Product to cause such disablement or impairment (sometimes referred to as a “trap door” device). Contractor agrees that in the event of a breach or alleged breach of this provision that Authorized User shall not have an adequate remedy at law, including monetary damages, and that Authorized User shall consequently be entitled to seek a temporary restraining order, injunction, or other form of equitable relief against the continuance of such breach, in addition to any and all remedies to which Authorized User shall be entitled.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.