Ambient Intelligence platform Sample Clauses

Ambient Intelligence platform. Ambient Intelligence pools: The proposed eu-DOMAIN platform is based on an Ambient Intelligent network that provide dynamic, self configuring intelligence support for users; anywhere and anytime. Users need different levels of intelligence support depending on location and situation. The demand for intelligence power is thus highly dynamic in time and space and the platform must be able to adapt to system dynamics. System architecture analysis will performed to define the most suitable system architecture for eu-DOMAIN, but a priori it is expected that a distributed network system will provide the best possibility for optimising system architecture according to factors such as power consumption, terminal size, availability, usability and costs. The eu-DOMAIN operates with three different “pools” of Ambient Intelligence (as seen from the user):
AutoNDA by SimpleDocs

Related to Ambient Intelligence platform

  • Use of the Platform 5.1. The Client agrees that he:

  • Trading Platform You agree and acknowledge that:

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Cloud Services Warranty Beginning on the date that the term of the initial Services Order for Cloud Services commences, We warrant to You that the Cloud Services will materially conform to the then current description of the Cloud Services in the Documentation. If You become aware of a warranty breach, You must notify Us in writing. Your sole and exclusive remedy for breach of this warranty will be either: (i) allow Us to modify the Cloud Services to conform to the current descriptions; or (ii) allow Us to provide a workaround solution that will reasonably meet Your requirements. If neither option is commercially reasonable, We may terminate the Agreement and refund any pre-paid, unused fees.

  • Customer Materials 12.1 The Supplier including any of its employees, agents, consultants, contractors and any third party shall:

  • Platform (i) Each Loan Party agrees that the Administrative Agent may, but shall not be obligated to, make the Communications (as defined below) available to the Lenders by posting the Communications on Debt Domain, Intralinks, Syndtrak or a substantially similar electronic transmission system (the “Platform”).

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

Time is Money Join Law Insider Premium to draft better contracts faster.