Analyze Data Sample Clauses

Analyze Data. Review Coachella census data and Coachella policing agency's cannabis arrest records. Analyze Social Equity programs of cities with similar demographics to identify barriers for social equity applicants and equity policies with proven success.
AutoNDA by SimpleDocs
Analyze Data. After receiving the testing report from the geotechnical firm, the CONSULTANT will analyze the data and any existing previous geotechnical data, consisting of the following tasks: (1) Review geotechnical recommendations (2) Determine appropriate data and soil information for incorporation onto plan sheets. (3) Prepare pavement data and soil information for incorporation onto plan sheets. (4) Evaluate existing pavement sections for potential recycling and reuse. (5) Evaluate shrink, swell, and consolidation potential.
Analyze Data. The evaluation partner will analyze data according to the Evaluation Plan (from Task 2b) and any addenda to answer the evaluation questions.
Analyze Data. After receiving the testing report from the geotechnical firm, that is under contract separately with the sponsor, the Consultant will analyze the data and any existing geotechnical data received, consisting of the following tasks: o Review geotechnical recommendations o Determine appropriate data for pavement design. o Input data for computer modeling with topographical survey data o Prepare pavement data and soil information for incorporation on plan sheets o Evaluate existing pavement sections for potential recycling and reuse
Analyze Data. The analysis and interpretation of the collected data is conducted during feedback sessions (i.e., a meeting of the people representing the point of view in the goal template and the data providers). The data, raw or graphically processed, are studied in advance by the participants of the feedback sessions. During the feedback sessions the presented material is analyzed and interpreted by the people in the point of view of the goal template. The results are conclusions with respect to the goal under investigation.
Analyze Data. On the basis of existing data, the Comprehensive Preliminary Watershed As- sessment, data analysis and the site conceptual model, stakeholders will determine whether additional data are needed and, if so, how they will be collected. Data needs will depend on specific programmatic requirements. The studies conducted for the major assessment and cleanup programs are described in Chapter 4, along with potential opportunities for integra- tion, but participants should also consider additional areas for integration that might apply to the contaminants, watershed, and participants in the specific watershed project. After carefully considering the types of additional data required for each agency or program and evaluat-
Analyze Data. This is the most important phase in the study. In this step, the researchers turn the raw data into structured and logically interconnected conclusions. On the other hand, due to its creative component, it is the less straightforward phase in the cycle. To help researchers to analyze the data and to draw the conclusions, there exists several methods for qualitative data analysis that can be followed. In the DevOps exploratory study considered here, the authors conducted a thematic analysis approach [10, 44]. Thematic analysis is a method for identifying, analyzing, and reporting patterns within the data. For that purpose, the data is chopped into small pieces of information, the quotations or segments, that are minimal units of data. Then, some individuals (typically some of the researchers) act as judges, codifying the segments to highlight the relevant information and to assign it a condensate description, the code. In the literature, codes are defined as “descriptive labels that are applied to segments of text from each study” [10]. In order to easy the task of the coders, the codes can be grouped into bigger categories that share come higher level characteristics, forming the semantic domains (also known as themes in this context). This introduce a multi-level codification that usually leads to richer analysis. A very important point is that splitting of the matter under study into quotations can be provided by a non-coder individual (typically, the thematic analysis designer), or it can be a task delegated to the coders. In the former case, all the coders work with the same segments, so it is easier to achieve a high level of consensus that leads to high reliability in the results of the analysis. In the later case, the coders can decide by themselves how to cut the stream of data, so hidden phenomena can be uncovered. However, the cuts may vary from a coder to another, so there exists a high risk of getting too diverse codifications that cannot be analyzed under a common framework. Thematic analysis can be instrumented through Atlas [1, 17], which provides an integrated frame- work for defining the quotations, codes and semantic domains, as well as for gathering the codifications and to compute the attained ICA. In the study considered in this section, the method for data analysis followed is described in the four phases described below (see also Figure 3).
AutoNDA by SimpleDocs
Analyze Data. CONSULTANT will analyze the geotechnical report and existing geotechnical data received from COUNTY, consisting of the following tasks: a. Review geotechnical recommendations. b. Determine appropriate data for pavement design. c. Input data for computer modeling with topographical survey data. d. Prepare pavement data and soil information for incorporation on plan sheets. e. Evaluate existing pavement sections for potential recycling and reuse.

Related to Analyze Data

  • Device Data We may share certain personal information and device-identifying technical data about you and your devices with third party service providers, who will compare and add device data and fraud data from and about you to a database of similar device and fraud information in order to provide fraud management and prevention services, which include but are not limited to identifying and blocking access to the applicable service or Web site by devices associated with fraudulent or abusive activity. Such information may be used by us and our third party service providers to provide similar fraud management and prevention services for services or Web sites not provided by us. We will not share with service providers any information that personally identifies the user of the applicable device.

  • Data To permit evaluation of requests under paragraph (c) of this clause based on unreasonable cost, the Contractor shall include the following information and any applicable supporting data based on the survey of suppliers: Foreign (Nondesignated Country) and Domestic Construction Materials Cost Comparison Construction material description Unit of measure Quantity Cost (dollars) * Item 1: Foreign construction material Domestic construction material Item 2 Foreign construction material Domestic construction material [List name, address, telephone number, and contact for suppliers surveyed. Attach copy of response; if oral, attach summary.][Include other applicable supporting information.] [* Include all delivery costs to the construction site.]

  • Licensee Data Licensee acknowledges and agrees that Licensee will be solely responsible for backing-up, and taking all appropriate measures to protect and secure, Licensee Data. Licensee acknowledges that Nuix may make, store and maintain back up copies of Licensee Data, but is not obliged to do so. Nuix will not be liable for any loss or corruption of Licensee Data.

  • Sensitive data Where the transfer involves personal data revealing racial or ethnic origin, political opinions, religious or philosophical beliefs, or trade union membership, genetic data, or biometric data for the purpose of uniquely identifying a natural person, data concerning health or a person’s sex life or sexual orientation, or data relating to criminal convictions and offences (hereinafter ‘sensitive data’), the data importer shall apply the specific restrictions and/or additional safeguards described in Annex I.B.

  • Encounter Data Party shall provide encounter data to the Agency of Human Services and/or its departments and ensure further that the data and services provided can be linked to and supported by enrollee eligibility files maintained by the State.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Product Information EPIZYME recognizes that by reason of, inter alia, EISAI’s status as an exclusive licensee in the EISAI Territory under this Agreement, EISAI has an interest in EPIZYME’s retention in confidence of certain information of EPIZYME. Accordingly, until the end of all Royalty Term(s) in the EISAI Territory, EPIZYME shall keep confidential, and not publish or otherwise disclose, and not use for any purpose other than to fulfill EPIZYME’s obligations, or exercise EPIZYME’s rights, hereunder any EPIZYME Know-How Controlled by EPIZYME or EPIZYME Collaboration Know-How, in each case that are primarily applicable to EZH2 or EZH2 Compounds (the “Product Information”), except to the extent (a) the Product Information is in the public domain through no fault of EPIZYME, (b) such disclosure or use is expressly permitted under Section 9.3, or (c) such disclosure or use is otherwise expressly permitted by the terms and conditions of this Agreement. For purposes of Section 9.3, each Party shall be deemed to be both the Disclosing Party and the Receiving Party with respect to Product Information. For clarification, the disclosure by EPIZYME to EISAI of Product Information shall not cause such Product Information to cease to be subject to the provisions of this Section 9.2 with respect to the use and disclosure of such Confidential Information by EPIZYME. In the event this Agreement is terminated pursuant to Article 12, this Section 9.2 shall have no continuing force or effect, but the Product Information, to the extent disclosed by EPIZYME to EISAI hereunder, shall continue to be Confidential Information of EPIZYME, subject to the terms of Sections 9.1 and 9.3 for purposes of the surviving provisions of this Agreement. Each Party shall be responsible for compliance by its Affiliates, and its and its Affiliates’ respective officers, directors, employees and agents, with the provisions of Section 9.1 and this Section 9.2.

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Client Data The Subrecipient shall maintain client data demonstrating client eligibility for services provided. Such data shall include, but not be limited to, client name, address, income level or other basis for determining eligibility, and description of service provided. Such information shall be made available to Grantee monitors or their designees for review upon request.

  • Data Encryption Contractor must encrypt all State data at rest and in transit, in compliance with FIPS Publication 140-2 or applicable law, regulation or rule, whichever is a higher standard. All encryption keys must be unique to State data. Contractor will secure and protect all encryption keys to State data. Encryption keys to State data will only be accessed by Contractor as necessary for performance of this Contract.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!