Technology Descriptive Information Sample Clauses

Technology Descriptive Information. The second page of the application is used to describe the SCR system fully and concisely. It will be used to prepare the test/QA plan and serves as a more complete description of the technology in the ETV report. It requires a concise (300 words or less) description of the SCR system being verified and requests a number of operating details that summarize the emissions control performance expected, along with the product’s operation. All questions may not apply. Instructions for completing this page can be found in the “Explan_Prod” page of the guidance document. If combinations of independent technologies are being submitted for ETV, the description of the combined technology should completely identify and describe those technologies being combined and fully state the nature of the combined test and expected result.
Technology Descriptive Information. This section of the application is intended to describe the technology more fully. It will be used to prepare the test/QA plan and as a more complete description of the technology in the ETV report. The applicant should describe the technology in a brief (300 word) statement, referring to the scientific principles of the technology’s operation. Depending on the complexity of the technology, this may be followed by more extensive information. When applicable, the inclusion of schematic drawings explaining operation of the technology is encouraged. Examples of descriptive information that should be included are: In the case of combinations of independent technologies that are being submitted for ETV, the description of the combined technology should completely identify and describe those technologies being combined and fully state the nature of the combined test and expected result.

Related to Technology Descriptive Information

  • Descriptive Data The contractor shall deliver data in accordance with and as specified in Section J, Exhibit A (Contract Data Requirements List (CDRL)) and as cited in each individual task order.

  • Sensitive Information Information that requires special precautions to protect from unauthorized use, access, disclosure, modification, loss, or deletion. Sensitive Information may be either Public Information or Confidential Information. It is information that requires a higher than normal assurance of accuracy and completeness. Thus, the key factor for Sensitive Information is that of integrity. Typically, Sensitive Information includes records of agency financial transactions and regulatory actions.

  • Corporate Information Promptly upon, and in any event within five (5) Business Days after, becoming aware of any additional corporate or limited liability company information or division information of the type delivered pursuant to Section 6.01(f), or of any change to such information delivered on or prior to the Closing Date or pursuant to this Section 8.01 or otherwise under the Credit Documents, a certificate, certified to the extent of any change from a prior certification, from the secretary, assistant secretary, managing member or general partner of such Credit Party notifying the Administrative Agent of such information or change and attaching thereto any relevant documentation in connection therewith.

  • Line Information Database 9.1 LIDB is a transaction-oriented database accessible through Common Channel Signaling (CCS) networks. For access to LIDB, e-Tel must purchase appropriate signaling links pursuant to Section 10 of this Attachment. LIDB contains records associated with End User Line Numbers and Special Billing Numbers. LIDB accepts queries from other Network Elements and provides appropriate responses. The query originator need not be the owner of LIDB data. LIDB queries include functions such as screening billed numbers that provides the ability to accept Collect or Third Number Billing calls and validation of Telephone Line Number based non-proprietary calling cards. The interface for the LIDB functionality is the interface between BellSouth’s CCS network and other CCS networks. LIDB also interfaces to administrative systems.

  • Use of De-identified information De-identified information may be used by the Contractor for the purposes of development, research, and improvement of educational sites, services, or applications, as any other member of the public or party would be able to use de-identified data pursuant to 34 CFR 99.31(b). Contractor agrees not to attempt to re-identify de-identified Student Data.