Desktop Applications Sample Clauses

Desktop Applications. Device License
AutoNDA by SimpleDocs
Desktop Applications per device license You must acquire a license for each device on or from which you access or use the software (locally or remotely over a network). You may install any number of copies and any prior version on the device or on a network device to support that use. You may install those copies on the host operating system or in a virtual hardware system. Figure 1 More than one copy can be installed on the licensed device. You may access copies of the software installed on a network device only from a device that has a license for the software. Figure 2 The device you use to remotely access software must be licensed for the same or higher edition, but not a lesser edition.
Desktop Applications 

Related to Desktop Applications

  • Mobile Application If Red Hat offers products and services through applications available on your wireless or other mobile Device (such as a mobile phone) (the "Mobile Application Services"), these Mobile Application Services are governed by the applicable additional terms governing such Mobile Application Service. Red Hat does not charge for these Mobile Application Services unless otherwise provided in the applicable additional terms. However, your wireless carrier's standard messaging rates and other messaging, data and other rates and charges will apply to certain Mobile Application Services. You should check with your carrier to find out what plans your carrier offers and how much the plans cost. In addition, the use or availability of certain Mobile Application Services may be prohibited or restricted by your wireless carrier, and not all Mobile Application Services may work with all wireless carriers or Devices. Therefore, you should check with your wireless carrier to find out if the Mobile Application Services are available for your wireless Device, and what restrictions, if any, may be applicable to your use of such Mobile Application Services.

  • Agreed Guidelines Applications With respect to the application of the Sentencing Guidelines to this case, the parties stipulate and agree as follows:

  • General Application The rules set forth below in this Article IV shall apply for the purposes of determining each Member’s general allocable share of the items of income, gain, loss or expense of the Company comprising Net Income or Net Loss of the Company for each Fiscal Year, determining special allocations of other items of income, gain, loss and expense, and adjusting the balance of each Member’s Capital Account to reflect the aforementioned general and special allocations. For each Fiscal Year, the special allocations in Section 4.4 shall be made immediately prior to the general allocations of Section 4.3.

  • Third-Party Applications Oracle or third party providers may offer Third Party Applications. Except as expressly set forth in the Estimate/Order Form, Oracle does not warrant any such Third Party Applications, regardless of whether or not such Third Party Applications are provided by a third party that is a member of an Oracle partner program or otherwise designated by Oracle as “Built For NetSuite,” "certified," "approved" or “recommended.” Any procurement by Customer of such Third Party Applications or services is solely between Customer and the applicable third party provider. Customer may not use Third Party Applications to enter and/or submit transactions to be processed and/or stored in the NetSuite CPQ, unless Customer has procured the applicable subscription to the NetSuite CPQ for such use and access. Oracle is not responsible for any aspect of such Third Party Applications that Customer may procure or connect to through the NetSuite CPQ, or any interoperation, descriptions, promises, or other information related to the foregoing. If Customer installs or enables Third Party Applications for use with the NetSuite CPQ, Customer agrees that Oracle may enable such third party providers to access Customer Data for the interoperation of such Third Party Applications with the NetSuite CPQ, and any exchange of data or other interaction between Customer and a third party provider is solely between Customer and such third party provider pursuant to a separate privacy policy or other terms governing Customer’s access to or use of the Third Party Applications. Oracle shall not be responsible for any disclosure, modification or deletion of Customer Data resulting from any such access by Third Party Applications or third party providers. No procurement of such Third Party Applications is required to use the NetSuite CPQ. If Customer was referred to Oracle by a member of one of Oracle’s partner programs, Customer hereby authorizes Oracle to provide such member or its successor entity with access to Customer’s business information related to the procurement and use of the NetSuite CPQ pursuant to this Agreement, including but not limited to User names and email addresses, support cases and billing/payment information.

  • Provisional Application Upon signature of this Compact, and until this Compact has entered into force in accordance with Section 7.3, the Parties will provisionally apply the terms of this Compact; provided that, no MCC Funding, other than Compact Implementation Funding, will be made available or disbursed before this Compact enters into force.

  • SCOPE & APPLICATION 5.1 This Agreement shall apply in the state of Victoria to: ⮚ The company in respect to all of its employees engaged in building and construction work as defined by the award. ⮚ Employees of the company who are engaged in any of the occupations, callings or industries specified in the award. ⮚ The CFMEU (Building Unions Division and FEDFA Division) Victorian Branch.

  • Applications To the extent that any provision of any Application related to any Letter of Credit is inconsistent with the provisions of this Section 3, the provisions of this Section 3 shall apply.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store County PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the County Information Security Office.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!