Sentences with phrase «log entry of»

The lounge staff will, where appropriate, make a voucher imprint / log entry of the Priority Pass card, and the cardholder is responsible for ensuring the» «Record of Visit» voucher / receipt / log correctly reflects their own usage and that of any guests at the time of using the lounge.
If your dating profile reads like the final log entry of a lost spaceship, you may want to reconsider.
The story is told mostly through the log entries of astronaut Mark Watney, chronicling his efforts to survive: making the prefab habitat livable and finding a way to grow food, make water, and get himself off the planet.
Excerpts from the Sept. 3 log entries of the two German vessels, the Beluga Fraternity and Beluga Foresight, are appended below.

Not exact matches

The app for this salacious site requires a PIN for entry, can provide a private phone line for explicit, untraceable chats, and lets users log out of it remotely.
I remember I had a set of 3 - by - 5 cards with every star log that Captain Kirk had recorded, you know, Stardate entry.
While it is an extra step to log in, it is one of the best ways to protect yourself from unauthorized account entry.
A log book of entries by patients and staff catalogues some of the encounters which John Hansen Brevetti, clinical operations manager, said had been happening over three decades.
The study captured the opinions and behaviors of more than 5,000 moms and members of the general population as well as an ethnography study of 23 moms that included over 1,000 text logs, 200 video entries, and 32 hours of in - home interviews.
Entries must be submitted online, by the Program Advisor, on behalf of the pair; log into your dashboard, click on the «Team Up Contest» tab, complete the necessary fields, and hit «submit» to enter.
The subpoena, excerpts of which were obtained by The Post, sought «phone logs, visitor logs, calendar entries between January 2012 and present that show meetings with any» entities on a list of 26 individuals and companies.
In 1981 John Darsee, a rising - star cardiologist at Harvard, faked log entries in a canine heart study in full view of his colleagues.
The mining process is built around a mathematical function, called a one - way hash function, that takes three inputs: the last log entry in the blockchain; a new blockchain entry, in which the miner awards him - or herself a fixed number of new bitcoins (currently 12.5); and an integer.
After each classification, the positions of any markers are written out to the classification data base, in an entry that also stores metadata including the ID of the subject, the username of the volunteer (or IP address if they are not logged in), and a timestamp.
Latest diary entries are displayed to users when logging in so this is a great way of getting a bit of extra attention as well!
I'm sure it's a passable entry in the series if you're willing to plug into their servers (required for the majority of the features, including teambuilder — why would I have to log onto their servers when all I want is to start a single - player dynasty???).
The film starts nicely with shots of the UCLA campus where the first host - to - host message was sent to Stanford in October 1969 — a moment that scientist Leonard Kleinrock, who was there, compares to the entry in Columbus's log indicating the sighting of land.
I probably logged a good 500 + hours total on the both of the Gamecube entries.
Templates Include: ABC Brainstorming Anecdotal Notes Anticipation Guides Carousel Brainstorming Choice Boards Entry / Exit Cards Examples / Non-Examples Four Corners Give One, Get One Hot Seat Questions Key Word Connections KWL Chart Learning Log List Ten Things One Minute Essay One Sentence Summary One Word Web Personal Connection Journal Quick Write and Draw Reading Log Reflection Journal Response Cards Square of Knowledge Student - Composed Questions Ten Minute Writing Samples Three Facts and a Fib 3 -2-1 Exit Card Two Starts and a Wish Venn Diagram What Am I?
In addition, I have to write a summary for my documentation, choose which part of the communication log I want to use, and make sure it's one that fits the requirements for my entry.
Operating in a wireless environment where the original doors and locks can be retained, readers on the main entry and exit points log arrival and departure times, providing another level of efficiency with time and attendance functionality.
Take a gander in one of my recent log entries and one can feel my meaning.
Even Dell, who consistently ranked online discussions as the most effective for reflection, participated infrequently, making a total of six entries while logged in only three times.
The Schools of California Online Resources for Education provides a teacher activity bank on its Language Arts CyberGuides (www.sdcoe.k12.ca.us/SCORE/cla.html) with information about graphic organizers, literature, rubrics, and types of journals (such as metacognitive, learning log, double - entry, and reflective).
Preeminent features inside include smartphone enables navigation, voice command recognition technology, SD card reader, video playback and image viewer via USB and SD card, controls of FATC on touchscreen and Bluetooth connectivity which enables multiple functions like call logs, conference call, phone book access, audio streaming, incoming SMS notification & read out and call reject with SMS feature (Please note that the above mentioned infotainment features are bereft in entry level variant).
So with 273 titles as of this moment published through WMG Publishing Inc., we have to hire data entry people to log in our sales to spread sheets to even get some idea how many we are selling of each title every quarter.
Interspersed among the log entries are sections told from the point of view of the NASA specialists, back on Earth, who discover that Watney is not dead (as everyone assumed) and scramble together a rescue plan.
Weir uses a mix of first - person narrative and log entries to tell his story.
Over the last few weeks, Comixology's role within parent company Amazon has gotten much stronger: Amazon is now part of the CX logo, you can log in to Comixology with your Amazon account, and as a couple of people pointed out, purchasing a book from Comixology is now linked directly from the main entry for a book.
Learn how to create a drop - down list to select the next date or next check number when updating lists of transactions or adding log entries.
You will not, and will not allow or authorize others to, use the Services, the Sites or any Materials therein to take any actions that: (i) infringe on PetSmart Charities» or any third party's copyright, patent, trademark, trade secret or other intellectual or proprietary rights, or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, constitute discrimination based on race, religion, ethnicity, gender, sex, disability or other protected grounds, or are pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on PetSmart Charities or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices, or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate any applicable «anti-spam» legislation, including that commonly referred to as «CASL»; (vii) would be or encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, national or international laws or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interference with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of PetSmart Charities» or another party's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other account users or attempt to gain access to other account users» accounts or otherwise mine information about other account users or the Sites, or interfere with any other user's ability to access or use the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) in PetSmart Charities» sole discretion, are contrary to PetSmart Charities» public image, goodwill, reputation or mission, or otherwise not in furtherance of our Vision of a lifelong, loving home for every pet.
You will not, and will not allow or authorize others to, use the Services or the Sites to take any actions that: (i) infringe on any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy; (ii) violate any applicable law, statute, ordinance or regulation (including those regarding export control); (iii) are defamatory, trade libelous, threatening, harassing, invasive of privacy, stalking, harassment, abusive, tortuous, hateful, discriminatory based on race, ethnicity, gender, sex or disability, pornographic or obscene; (iv) interfere with or disrupt any services or equipment with the intent of causing an excessive or disproportionate load on the Animal League or its licensors or suppliers» infrastructure; (v) involve knowingly distributing viruses, Trojan horses, worms, or other similar harmful or deleterious programming routines; (vi) involve the preparation and / or distribution of «junk mail», «spam», «chain letters», «pyramid schemes» or other deceptive online marketing practices or any unsolicited bulk email or unsolicited commercial email or otherwise in a manner that violate the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN - SPAM Act of 2003); (vii) would encourage conduct that could constitute a criminal offense, give rise to civil liability or otherwise violate any applicable local, state, federal or international laws, rules or regulations; (viii) involve the unauthorized entry to any machine accessible via the Services or interfere with the Sites or any servers or networks connected to the Sites or disobey any requirements, procedures, policies or regulations of networks connected to the Sites, or attempt to breach the security of or disrupt Internet communications on the Sites (including without limitation accessing data to which you are not the intended recipient or logging into a server or account for which you are not expressly authorized); (ix) impersonate any person or entity, including, without limitation, one of the Animal League's or other's officers or employees, or falsely state or otherwise misrepresent your affiliation with a person or entity; (x) forge headers or otherwise manipulate identifiers in order to disguise the origin of any information transmitted through the Sites; (xi) collect or store personal data about other Animal League members, Site users or attempt to gain access to other Animal League members information, or otherwise mine information about Animal League members, Site users, or the Sites; (xii) execute any form of network monitoring or run a network analyzer or packet sniffer or other technology to intercept, decode, mine or display any packets used to communicate between the Sites» servers or any data not intended for you; (xiii) attempt to circumvent authentication or security of any content, host, network or account («cracking») on or from the Sites; or (xiv) are contrary to the Animal League's public image, goodwill, reputation or mission or otherwise not in furtherance of the Animal Leagues stated purposes.
An arched log entry and handmade doors enhance the appeal of the two - story honeymoon cabin.
I started it as a training tool for myself and to share photos with my friends and fellow pilots The bulk of the material is strait forward flight log entries but occasionally I got inspired and expand on the experience.
A qualifying certification is defined as proof of certification beyond entry level, and proof of 20 or more logged dives documenting experience in deep diving and under water navigation
The Tudor Suiteis an intimate suite with Queen Size 4 Posted Carved Mahogany bed, crackling log fire at the foot of same, kitchenette, whitewashed walls and garden deck with romantic outdoor setting for two surrounded by evergreen trees and foliage opposite the entry.
Have logged a minimum of 40 open water dives prior to entry into the course, and completed and logged a minimum of 60 open water dives with experience in night, deep and navigation prior to certification;
PADI dive course prices normally include PADI instructor, study manual (except Phi Phi courses and Krabi Divemaster course), use of all scuba equipment (except Divemaster) and training materials, log books for entry - level certifications, certification costs, pool training and entrance fees to parks etc..
Fortnite has been a free obtain on the iOS App Store because the debut of the take a look at in March, although solely those that have been granted entry (by Epic or by means of the following spherical of buddy invitations) may truly log in.
The display order of Log Book entries is also heavily different between the two versions.
Then came the engine reboot I talked about in the last dev log entry, at which point the tile limit became more of a suggestion than a hard - and - fast rule enforced by limitations of the engine itself.
The interesting one is the Norton Antivirus 2005 Special EditionNorton AntiVirus Special Edition does not include the following features: Norton ™ Internet Worm Protection, which stops certain damaging Internet worms at their attempted point of entry; and extended threat protection, which detects spyware and certain non-virus threats such as adware and keystroke logging programs
«Joining the nation's growing proliferation of political Web logs, or blogs, the Utah site was the first of its kind to strike up a digital dialogue that included entries not just from state Senate Republicans but also from minority Democrats and lawmakers in the opposite chamber.
(These are discussed, along with many other examples in posts on the great Language Log; this entry will provide you with many of the links.)
An investigation revealed that the truck driver had a history of falsifying entries in his rest log to make it seem as though he was getting the required amount of sleep each day.
I just wish to chime in that one of the advantages of Dragon Professional or Legal over Premium is the ability to create custom voice commands — commands that can save considerable time for repetitious tasks (i.e. pre-filling in a time entry or calling up precedents or logging into a legal reference website etc.).
The Importance of Discovering Rest - Log Fraud So why is it important to discover that a truck driver is falsifying his or her rest log entriLog Fraud So why is it important to discover that a truck driver is falsifying his or her rest log entrilog entries?
Representation included providing e-discovery advice on all aspects of the case, managing a team of over 340 timekeepers, and supervising the review of over 8 million documents and the creation of over 40,000 privilege log entries.
Created and managed document depository consisting of five million pages of company documents and privilege logs in excess of twenty thousand entries.
Now a lot of people get the jargon of blogging wrong, referring to individual posts or entries as «blogs,» perhaps not making the connection between blog and weblog and the antecedent «log» itself, which has always had «entries
a b c d e f g h i j k l m n o p q r s t u v w x y z