Sentences Generator
And
Your saved sentences

No sentences have been saved yet

55 Sentences With "requestor"

How to use requestor in a sentence? Find typical usage patterns (collocations)/phrases/context for "requestor" and check conjugation/comparative form for "requestor". Mastering all the usages of "requestor" from sentence examples published by news publications.

And if unmasked, the identity is revealed only to the specific requestor.
The service then connects the requestor with a set of providers that match the requirements.
It works with 1.2 million human translators who are paid if their translation is picked by the requestor.
Prior to releasing any customer data, they analyze the lawfulness of each request and the identity of the requestor.
From there, the requestor can review expert profiles and compare the ratings and offerings in a kind of online marketplace.
Once FEMA funding is assured for the requestor, they are put in a cab and sent someplace, usually a hotel or motel.
"Whether the imposition of additional duties on the particular product would cause severe economic harm to the requestor or other U.S. interests," it added in a filing.
In response to existing FOIA requests, agencies process responsive records and lawfully redact sensitive information, such as personal information or national security secrets, before producing those records to the requestor.
"Under the law, the burden of proof is on an applicant, petitioner, or requestor to establish eligibility -- not the other way around," said USCIS spokesperson Michael Bars, who emphasized the policy is part of a move to cut down on abuse and "frivolous" applications.
"In making its determination on each request, USTR may consider whether a product is available from a source outside of China, whether the additional duties would cause severe economic harm to the requestor or other U.S. interests and whether the particular product is strategically important or related to Chinese industrial programs, including 'Made in China 2025,'" USTR said.
"Information provided to USCIS in DACA requests will not be proactively provided to ICE and CBP for the purpose of immigration enforcement proceedings, unless the requestor meets the criteria for the issuance of a Notice To Appear or a referral to ICE under the criteria set forth in USCIS' Notice to Appear guidance," DHS said in a prepared statement.
SRT = Single Requestor Terminal program. Not a MRT. NRT = No Requestor Terminal program. Started at a terminal, the NRT releases the requesting terminal and continues.
WS-Federation Passive Requestor Profile is a Web Services specification - intended to work with the WS-Federation specification - which defines how identity, authentication and authorization mechanisms work across trust realms. The specification deals specifically with how applications, such as web browsers, make requests using these mechanisms. In this context, the web- browser is known as a "passive requestor." By way of contrast, WS-Federation Active Requestor Profile deals with "active requestors" such as SOAP-enabled applications.
WS-Federation Active Requestor Profile is a Web Services specification - intended to work with the WS-Federation specification - which defines how identity, authentication and authorization mechanisms work across trust realms. The specification deals specifically with how applications, such as SOAP-enabled applications, make requests using these mechanisms. By way of contrast, WS-Federation Passive Requestor Profile deals with "passive requestors" such as web-browsers. WS-Federation Active Requestor Profile was created by IBM, BEA Systems, Microsoft, VeriSign, and RSA Security.
When a requestor requires a trusted timestamp for a piece of data, it creates a hash of the data using a cryptographic hash function and sends it to the TSA (through a network connection). The TSA then signs the hash and the time of signature to create a trusted timestamp. This trusted timestamp is finally returned to the requestor, who can store it along with the data. For applications using digitally signed data, the requestor signs the digital hash with its private key and submits the digital signature to the TSA, which performs the same operations as in the previous example: bind the submitted data with a timestamp using its cryptographic binding and return the results to the requestor.
The requestee runs a compliance checker taking as input the request, associated credentials from the requestor, and its local policies.
Even though losing some of the effectiveness the requestor could state that they are "close to their goal" or "almost there".
Door-in-the- face was first introduced in 1975 by Cialdini and colleagues. The opposite of foot-in-the-door, in the door-in-the-face technique, the requestor asks a large objectionable request which is denied by the target instead of gaining compliance by asking a smaller easy request. The requestor seeking compliance ask a smaller more reasonable request. There are several theories that explain why door-in-the-face is an effective gaining compliance technique.
The benefits as a requestor would be getting more accurate, fast and low-cost translations from professional translators; wide pool of translators to select from (over 1,000 translators); requestor can directly communicate with the translator who is on the task through the 1:1 Message service. The benefits as a translator would be the lowest commission/brokerage fees in the market and that the translator has more freedom to choose which translation projects to take on.
When the requestor receives the timestamp token from the TSA, it also optionally signs the token with its private key. The requestor now has evidence that the data existed at the time issued by the TSA. When verified by a verifier or relying party, the timestamp token also provides evidence that digital signature has existed since the timestamp was issued, provided that no challenges to the digital signature's authenticity repudiate that claim. Generating a timestamp for signed data.
National Institute for Occupational Safety and Health. Accessed May 8, 2009. The report is given to the requestor, the employer, employee representatives, OSHA, and other appropriate agencies; most reports are posted on the NIOSH website.
Employees of a company or organization using The Work Number's services receive an account that is set up for them on the website. Current, and presumably, former employees can log on to The Work Number at any time. Employees cannot control access to their records by any entity or person which knows their social security number. If the employee wishes for a requestor to see his or her salary history, the employee logs on and obtains a 6-digit code, which he or she passes on to the requestor.
It is seen as "the last person to help will be more rewarding than being one of the first or those in the middle, due to the expectation that the requestor will appreciate the last person more than any of those who complied previously". For Example: "Do you want to buy this car? I need just one more sale to reach my quota this month." If the target finds that the requestor is lying or being deceptive about being the last one, it will create a negative outlook on the person and the organization that he or she represents.
Forcing internal servers to connect to the internet in order to use OCSP contributes to the De- perimeterisation trend. The OCSP stapling protocol is an alternative that allows servers to cache OCSP responses, which removes the need for the requestor to directly contact the OCSP responder.
A distributed processing on-line automated trading system uses structured messages to represent each stage in the negotiation between a market maker (quoter) and a potential buyer or seller (requestor).Hartheimer, Richard, et al. "Financial exchange system having automated recovery/rollback of unacknowledged orders." U.S. Patent No. 5,305,200.
The responding party also can submit a response to the requestor explaining why the documents cannot be produced. For example, the responding party may indicate that documents are unavailable because they have been destroyed, that it would be unduly burdensome to produce the documents, or that the documents are not in possession of the responding party. However, the requestor then may file a Motion to Compel discovery to ask the court to order the responding party to produce documents. The rules governing requests for the production of documents vary from jurisdiction to jurisdiction; in the U.S. Federal court system, such requests are governed by Rule of the Federal Rules of Civil Procedure.
MRT = Multiple Requestor Terminal program. SSP could attach up to 7 terminals to a program at once. Any operator could start the program at their terminal, then other operators' terminals would be attached when they selected the same program. The maximum number of terminals to be serviced was controllable by the programmer.
The report was created by the Naval Safety Investigation Board but has been classified by the Navy Judge Advocate General as a "Dual Purpose Investigation". The Navy will therefore not release the report under the Freedom of Information Act.Letter, Cmdr. M. Robb Hyde, Deputy Assistant Judge Advocate General, to FOIA Requestor (7/27/09).
This isn't necessarily cloaking. For instance, Google uses IP delivery for AdWords and AdSense advertising programs to target users in different geographic locations. IP delivery is a crude and unreliable method of determining the language in which to provide content. Many countries and regions are multilingual, or the requestor may be a foreign national.
Information about use and amount of Communication Surveillance should be available to those who request it. States should provide the requestor with information sufficient to ascertain the nature of the request and determine the size of both the request and those who will be affected by it. Records of requests for communications surveyed should also be published.
Without that particular 6-digit code, the requestor is not allowed to view salary of the employee. Equifax advertises and sells some data to third parties. Companies including "mortgage, auto and other financial services credit grantors" may request pay rate information similar to a credit report. Also, "debt/collection agencies may request employment information" to verify someone's place of employment.
Serum from the DoDSR may be requested by clinicians within the Military Health System to aid diagnosis and guide clinical management. Serum may also be released to clinicians outside the Military Health System provided a physician in the Military Health System in the same specialty as the requestor validates the clinical relevance of the requested use prior to the release of any serum.AFHSC 2003, p.10.
A creative brief is a document used by creative professionals and agencies to develop creative deliverables: visual design, copy, advertising, web sites, etc. The document is usually developed by the requestor (in most cases a marketing team member) and approved by the creative team of designers, writers, and project managers. In some cases, the project's creative brief may need creative director approval before work will commence.
The client-based version of Btrieve for Windows could access server-based versions of Btrieve via a DOS-based "requester". The requestor required the use of DOS Protected Mode Interface (DPMI) which allowed program access to DOS extended memory accessible only via the CPU's Protected Mode. As with the client-based interface, the Btrieve-based application makes a call to the `WBTRCALL.DLL` loader and requester interface library.
The museum offers four types of visits: guided visits, family visits, group visits and visits for schools. Guided visits Open to all publics and prepared according to the interests of the requestor. They include the visit to the temporary rooms and the site of Cornia Nou. For families Families can visit the museum with the help of the staff or asking for a guided tour.
When the C.A (Privacy certification Authority) receives the EKpub sent by the TPM, the C.A verifies the information. If the information can be verified it will create a certified secondary key pair AIK, and sends this credential back to the requestor. This is intended to provide the user with anonymity. When the user has this certified AIK, he or she can use it to communicate with other trusted platforms.
Check Out is the process of retrieving data from the BitVault system. The application which uses BitVault as its datastore gives the hash key of the object to be retrieved, which is sent by the MRL to any brick. If the brick doesn’t have the object, it passes the request on to other bricks, in parallel. If the brick has the object, it is retrieved from its Data Module and routed to the requestor.
The loaning of fire related records to the military has declined since 2006 because many such records now fall into the "archival records" category of military service records. This means the records were transferred from the military to the National Archives, and in such cases, the Purple Heart may be privately purchased by the requestor (see above section of retroactive requests for further details) but is no longer provided by the military service department.
Build-on-demand or manufacturing on demand (MOD) refers to a manufacturing process where goods are produced only when or as they are required. This allows scalability and adjustable assemblies depending on the current needs of the part requestor or client. Manufacturing on demand has the potential to markedly affect the manufacturing industry by shortening lead times and reducing costs. Manufacturing previously relied on Request for Quotes (RFQs) that were not digitally obtainable.
When an invoice arrives against the order, the accounts payable department will then go directly to the requestor of the purchase order to verify that the goods or services were received. This is typically what is done for goods and services that will bypass the receiving department. A few examples are software delivered electronically, NRE work (non-reoccurring engineering services), consulting hours, etc. Historically, the purchasing department issued purchase for supplies, services, equipment, and raw materials.
Then, it repairs the damaged data and returns good data to the requestor. There are five different RAID-Z modes: RAID-Z0 (similar to RAID 0, offers no redundancy), RAID-Z1 (similar to RAID 5, allows one disk to fail), RAID-Z2 (similar to RAID 6, allows two disks to fail), RAID-Z3 (a RAID 7 configuration, allows three disks to fail), and mirror (similar to RAID 1, allows all but one of the disks to fail).
Windows CardSpace also keeps a track of all Identities used, and represents them as visually identifiable virtual cards, accessible to the user from a centralized location. Whenever an application requests any identity, Windows CardSpace informs the user about which identity is being used and needs confirmation before it provides the requestor with the identity. Windows CardSpace presents an API that allows any application to use Windows CardSpace to handle authentication tasks. Similarly, the API allows Identity Providers to hook up with Windows CardSpace.
IBM's initial answer was OfficeVision/2, a server-requestor system designed to be the strategic implementation of IBM's Systems Application Architecture. The server could run on OS/2, VM, MVS (XA or ESA), or OS/400, while the requester required OS/2 Extended Edition running on IBM PS/2 personal computers, or DOS. IBM also developed OfficeVision/2 LAN for workgroups, which failed to find market acceptance and was withdrawn in 1992. IBM began to resell Lotus Notes and Lotus cc:Mail as an OfficeVision/2 replacement.
The limited pointer format uses a set number of pointers to track the processors that are caching the data. When a new processor caches a block, a free pointer is chosen from a pool to point to that processor. There are a few options for handling cases when the number of sharers exceeds the number of free pointers. One method is to invalidate one of the sharers, using its pointer for the new requestor, though this can be costly in cases where a block has a large number of readers, such as a lock.
A video about measuring contaminants on workers' skin and workplace surfaces as part of an HHE investigation A video about medical testing at a workplace as part of an HHE investigation NIOSH typically initially contacts the requestor within 30 days to discuss the request. How the request is addressed largely depends on the nature of the request. In most cases, NIOSH responds with a telephone consultation to discuss the problems and how to correct them. For other requests, NIOSH visits the workplace to learn more about the health hazards present.
The U.S. Freedom of Information Act (FOIA) was signed into law by President Lyndon B. Johnson on July 4, 1966, took effect the following year, and was amended in 1974, 1976, 1986, 1996 and 2002 (in 1974 over President Ford's veto). This act allows for the full or partial disclosure of previously unreleased information and documents controlled by the U.S. government. Any member of the public may ask for a classified document to be declassified and made available for any reason. The requestor is required to specify with reasonable certainty the documents of interest.
The Work Number is an example of outsourcing of a Human Resources department function. Additionally, the adoption of The Work Number causes a change in the financial responsibility for verification of employment. In typical organizations, the cost of a verification of employment is borne completely by the employer and the actual cost of service is absorbed into the human resource department budget. In organizations using The Work Number, the cost is borne by the requestor of verification, who purchases either a single verification or a package of multiple verifications from TALX.
Minimum area size refers to the smallest region expanded from the exact location point which satisfies the specific privacy requirements. Usually, the higher the privacy requirements, the bigger the area is required to increase the complicity of distinguishing the exact location of users. Also, the idea of minimum area is particularly important in dense areas when K-anonymity might not be efficient to provide the guaranteed privacy-preserving performance. For example, if the requestor is in a shopping mall which has a promising discount, there might be a lot of people around him or her, and thus this could be considered a very dense environment.
Buchanan resented the fact that Breckinridge had supported both Pierce and Douglas before endorsing his nomination. Relations between the two were further strained when, upon asking for a private interview with Buchanan, Breckinridge was told to come to the White House and ask for Harriet Lane, who acted as the mansion's host for the unmarried president. Feeling slighted by the response, Breckinridge refused to carry out these instructions; later, three of Buchanan's intimates informed Breckinridge that requesting to speak to Miss Lane was actually a secret instruction to White House staff to usher the requestor into a private audience with the president. They also conveyed Buchanan's apologies for the misunderstanding.
In addition to handling whole-disk failures, RAID-Z can also detect and correct silent data corruption, offering "self-healing data": when reading a RAID-Z block, ZFS compares it against its checksum, and if the data disks did not return the right answer, ZFS reads the parity and then figures out which disk returned bad data. Then, it repairs the damaged data and returns good data to the requestor. RAID-Z and mirroring do not require any special hardware: they do not need NVRAM for reliability, and they do not need write buffering for good performance or data protection. With RAID-Z, ZFS provides fast, reliable storage using cheap, commodity disks.
Distributed Access Control System (DACS) is a light-weight single sign-on and attribute-based access control system for web servers and server-based software. DACS is primarily used with Apache web servers to provide enhanced access control for web pages, CGI programs and servlets, and other web-based assets, and to federate Apache servers. Released under an open-source license, DACS provides a modular authentication framework that supports an array of common authentication methods and a rule-based authorization engine that can grant or deny access to resources, named by URLs, based on the identity of the requestor and other contextual information. Administrators can configure DACS to identify users by employing authentication methods and user accounts already available within their organization.
Individual trace results can be printed directly from eTrace and summarizes the firearm's trace pedigree to the first purchaser. The Firearms Trace Summary shows the full firearm description, requesting agency information, and possessor and recovery location (if provided by the requestor). If the firearm is traced successfully, the name of the [first] purchaser, the identification used, physical description, place of purchase, and a calculation of the time period between the retail sale and the criminal recovery (time-to-crime) is also given. What Trace Results Look Like: In addition to seeing the most recent trace results on the home page, users can select views of any or all of their trace results by going to the Search for Trace Results screen.
In computer science, request–response or request–reply is one of the basic methods computers use to communicate with each other in a network, in which the first computer sends a request for some data and the second responds to the request. More specifically, it is a message exchange pattern in which a requestor sends a request message to a replier system, which receives and processes the request, ultimately returning a message in response. It is analogous to a telephone call, in which the caller must wait for the recipient to pick up before anything can be discussed. This is a simple but powerful messaging pattern which allows two applications to have a two-way conversation with one another over a channel; it is especially common in client–server architectures.
ATF publicized global eTrace access in United Nations Disarmament Marking and Tracing Workshops held in Nairobi, Kenya in December, 2007, Lomé, Togo in April, 2008, Rio de Janeiro in June, 2008, and other locations. ATF reports over 2,000 agencies around the world and over 10,000 individuals have access to first purchaser American gun owner personal information. Tracing data is of no value without identifying the individual purchaser (name & address), so ATF specifically provides "a description of the original retail purchaser" to the requestor. In GAO Report 09-709, ATF reports the National Tracing Center, “conducts the gun traces, and returns information on their findings to the submitting party”. The U.S. Tiahrt Amendment and the 2008 Appropriations Bill specifically (financially) prohibits ATF from disclosing certain personal information from the Firearms Tracing System and retrieving information by name.
In such cases, requestors asking for a Purple Heart (especially from records of the First World War) are provided with a complete copy of all available records (or reconstructed records in the case of the 1973 fire) and advised the Purple Heart may be privately purchased if the requestor feels it is warranted. A clause to the archival procedures was revised in mid-2008, where if a veteran, or, if deceased, an immediate member of the family, requested the Purple Heart, on an Army or Air Force record, the medal could still be granted by the National Archives. In such cases, where a determination was required made by the military service department, photocopies of the archival record, (but not the record itself), would be forwarded to the headquarters of the military branch in question. This stipulation was granted only for the Air Force and Army; Marine Corps, Navy, and Coast Guard archival medals requests are still typically only offered a copy of the file and told to purchase the medal privately.

No results under this filter, show 55 sentences.

Copyright © 2024 RandomSentenceGen.com All rights reserved.