Big Chemical Encyclopedia

Chemical substances, components, reactions, process design ...

Articles Figures Tables About

Software accessibility

Install system to prevent unauthorized software access and changes... [Pg.123]

LifeLine Group (2005) Aggregate and Cumulative Exposure and Risk Assessment Software, Version 4.3. Annandale, VA, The LifeLine Group, Inc. (http // www.thelifelinegroup.org/index.htm software accessed 5 May 2005). [Pg.278]

This defines the scope of the test(s). It is a written description of the scope and restrictions of the test.) Testing is done to prove the S-Plus 5.1 is operational in accordance with the manufacturer s criteria. Testing is also done to prove that data and executable software access is limited to authorized users and only up to the number of available licenses. Testing is also done to verify the backup and restoration of selected data and executable hies. [Pg.75]

Jones D. Timely safety surveillance of clinical study safety data. Atlanta, GA Tibco Software (accessed August 13,2014 at http //www.tibco.com/company/ news/releases/2012/tibco-spotfire-to-showcase-graphical-representation-of-safety-data-for-timely-safety-surveillance-during[Pg.222]

If our attempt to use Infer to provide a type inference system for DDD had been successful, interactions PVS would have been even more convoluted. What we would like, of course, is to share the same inference system. For that matter, we would also like software access to other facilities, like the term rewriter. [Pg.268]

The main characteristic of Software Implemented Fault Injection (SWIFI) is the capacity of injecting previously defined faults in any software accessible functional unit, like memories, registers, peripheral devices, etc. The objective of the injection is the detection of functional errors cansed by faults in HW or systematic errors in SW design. [Pg.1913]

The generation, ranking, and characterization engine software package [GRACE], 2014. http //www.avmatsim.de/services/software. Accessed July 21, 2014. [Pg.284]

January 21, 2014. Available at http //www.epa.gov/nrmrl/std/lca/resources. html Software (accessed January 26, 2014). [Pg.49]

Part 151. Guidance on World Wide Web user interfaces Part 171. Guidance on software accessibility... [Pg.275]

ASA is sold by the TU Delft. More information on ASA can be found under the following URL http //www.ewi.tudelft.nl/en/the-faculty/departments/electiical-sustainable-energy/photovoltaic-materials-and-devices/asa-software/ (accessed 3/1 013)... [Pg.317]

Good quality, free software accessible via the Internet. [Pg.1130]

Projection radiography is widely used for pipe inspection and corrosion monitoring. Film digitisation allows a direct access to the local density variations by computer software. Following to a calibration step an interactive estimation of local wall thickness change based on the obtained density variation is possible. The theoretical model is discussed, the limitations of the application range are shown and examples of the practical use are given. The accuracy of this method is compared to results from wall thickness measurements with ultrasonic devices. [Pg.561]

All CD s are stored in a CD-jukebox (100 CD s per jukebox), and are accessible to all HP9000 workstations under HP-UX 9.05 via the fXOS software (Ixos-Jukeman VI.3b). The Ixos-Jukeinan software has a slow time response for filenames searches on the jukeboxes. This problem has been encompassed. Laborelec has developed a dedicated static database software. This database is loaded once for all after burning and verifying CD s. All CD s are read from the jukebox and all the filenames are saved in this database. One jukebox can contain more than 65.000 records. This dedicated software retrieves files from jukebox almost instantaneously. [Pg.1024]

Access to CAS databases is only possible on computers on which the SciFinder software has been installed. Tt is directly available at CAS, computational seiwice centers, or library seiwices with online access. The database is not free of charge access can be obtained only via these services. After the licensed software has been installed and online access is obtained, the program tan be started. [Pg.242]

The chirality code of a molecule is based on atomic properties and on the 3D structure. Examples of atomic properties arc partial atomic charges and polarizabilities, which are easily accessible by fast empirical methods contained in the PETRA package. Other atomic properties, calculated by other methods, can in principle be used. It is convenient, however, if the chosen atomic property discriminates as much as possible between non-equivalent atoms. 3D molecular structures are easily generated by the GORINA software package (see Section 2.13), but other sources of 3D structures can be used as well. [Pg.420]

Molecular modelling used to be restricted to a small number of scientists who had access to the necessary computer hardware and software. Its practitioners wrote their own programs, managed their own computer systems and mended them when they broke down. Today s computer workstations are much more powerful than the mainframe computers of even a few years ago and can be purchased relatively cheaply. It is no longer necessary for the modeller to write computer programs as software can be obtained from commercial software companies and academic laboratories. Molecular modelling can now be performed in any laboratory or classroom. [Pg.13]

In order to balance public domain science with a high quality commercial software product it has been necessary for us to reimplement almost every aspect of computational chemistry embodied in HyperChem. All HyperChem source code is written in C or C-t-t, specified, designed, and implemented by Hyper-Chem s developers. We have stood on the scientific shoulders of giants, but we have not used their FORTRAN code Thus, although we have had access to MOPAC and other public domain codes for testing and other purposes, HyperChem computes MINDO, MNDO, and AMI wave functions, for example, with HyperChem code, not MOPAC code. We have made the effort to implement modern chemical science in a modern software-engineered product. [Pg.158]

The memory units within the computer — known as random access memory (RAM) — must be capable of change as needed to run software programs. [Pg.419]

Location of and access to chemical and technical information other than journal articles is avadable through computerized information networks. Electronic bulletin board systems (BBS) provide a telecommunications tool to anyone who has a computer and a modem. Questions can be posted and read by thousands of bulletin board users worldwide, and files and software are easdy transferred from virtually anywhere to one s computer. [Pg.112]

MDL Information Systems, Inc. MDL provides modular software systems for managing chemical information, as weU as related molecular and reaction databases for use with the software. MDL s database management programs, MACCS-II and REACCS, provide access to compound and reaction databases and also have the capabiHty to manage user-created databases (37). Although MDL is not considered to be an on-line database vendor, it is mentioned here because of the value of its information products and services to the chemical industry. [Pg.114]

Private (EPA) Databases. The U.S. EPA maintains a Hst of approximately 600 current information systems, as weU as some of the models and databases used within the organi2ation. The Hst is pubHshed in Information Systems Inventoy (ISI) which is updated yearly and maintained by the Information Management and Services Division of the Office of Information Resources Management (109). ISI Hsts the system name and acronym, system level, responsible organi2ation, contact person, legislative authorities, database descriptors, access information, hardware and software, system abstract, and keywords. [Pg.130]

The hardware and software used to implement LIMS systems must be vahdated. Computers and networks need to be examined for potential impact of component failure on LIMS data. Security concerns regarding control of access to LIMS information must be addressed. Software, operating systems, and database management systems used in the implementation of LIMS systems must be vahdated to protect against data cormption and loss. Mechanisms for fault-tolerant operation and LIMS data backup and restoration should be documented and tested. One approach to vahdation of LIMS hardware and software is to choose vendors whose products are precertified however, the ultimate responsibihty for vahdation remains with the user. Vahdating the LIMS system s operation involves a substantial amount of work, and an adequate vahdation infrastmcture is a prerequisite for the constmction of a dependable and flexible LIMS system. [Pg.518]


See other pages where Software accessibility is mentioned: [Pg.317]    [Pg.743]    [Pg.744]    [Pg.529]    [Pg.362]    [Pg.467]    [Pg.46]    [Pg.129]    [Pg.306]    [Pg.317]    [Pg.743]    [Pg.744]    [Pg.529]    [Pg.362]    [Pg.467]    [Pg.46]    [Pg.129]    [Pg.306]    [Pg.389]    [Pg.1012]    [Pg.242]    [Pg.158]    [Pg.13]    [Pg.356]    [Pg.308]    [Pg.310]    [Pg.159]    [Pg.112]    [Pg.112]    [Pg.113]    [Pg.130]    [Pg.402]    [Pg.442]    [Pg.396]    [Pg.34]   


SEARCH



© 2024 chempedia.info