GENESYS Sample Clauses

GENESYS. The GENESYS Architecture proposes a “conceptual model and terminology for component-based development of distributed real-time systems”. The core platform services provide elementary capabilities for the interaction of components, such as message-based communication between components or a Framework for adaptation through reconfiguration of components eDIANA: GA no.: 100012 D2.2-C global time base. In addition, the specification of a component’s interface builds upon the concepts and operations of the core platform services. The component interface specification constrains the use of these operations and assigns contextual information (e.g. semantics in relation to the component environment) and significant properties (e.g. reliability requirements, energy constraints). The core platform services are a key aspect in the interaction between integrator and component developer. Different types of services can be distinguished: global application services of the overall system, local application services of components, and platform services. The critical concept of component interface is introduced through the Linking Interface (borderline between component and platform) and it represents the unique point of transfer of information between the component and the rest of the platform – it must define the syntax of the information exchange, the different timing events and possibly the relationship with the environment [5]-. The GENESYS architecture [6] provides deep insight into which concepts must be addressed by component frameworks. For example, it makes specific distinction between integration levels, ranging from system, device, to chip. It also presents the needed abstraction levels required to analyse, design and introspect the platform. It recommends the maximum simplification of the platform and systems to increase the various qualities included within dependability, this can be reached through abstraction, partitioning or segmentation. Other important themes which are addressed include network connectivity, resource management, and the typical robustness and security features. A reconfiguration system is provided within the GENESYS architecture [6], and centres on providing a resource reallocation scheme. New resource allocations can be calculated by a general purpose micro component at run-time or can be determined offline before deployment and fetched at run-time. The reconfiguration core service investigates new resource allocations by checking the c...
AutoNDA by SimpleDocs
GENESYS. (a) Section 4.24(a) of the Disclosure Schedule sets forth with respect to Genesys as of January 28, 1994: (i) the authorized capital stock; (ii) the number of shares issued and outstanding; (iii) the identity of the holders of all such shares of issued and outstanding shares of stock; and (iv) the number of shares held in treasury of Genesys. As of the date hereof, all of the shares of capital stock of Genesys held by the Company are duly authorized, validly issued, fully paid and non-assessable. (b) Genesys ceased all active business operations on July 31, 1993, and since that time has had no ongoing business operations and is currently inactive. (c) The Amended and Restated Stockholder Agreement, dated as of December 31, 1992, by and between the Company and Corporate Systems, Ltd. (the "Stockholder Agreement"), a copy of which has been delivered to Buyer and which is listed in the Disclosure Schedule, is valid, in full force and effect and has not been superseded or amended in any way. (d) The cessation of Genesys' operations was performed in material compliance with (i) all applicable laws and regulations, including requirements relating to regulatory approvals or notifications and employee terminations; and (ii) all applicable client or provider agreements and employee benefit plans or programs. (e) Other than compliance with the Stockholder Agreement, the Company has no current or future obligations, financial or otherwise, whether accrued or not, known or unknown, with respect to Genesys or its prior business or employees. Section 4.25

Related to GENESYS

  • IBM Credit may in its sole discretion from time to time decide the amount of credit IBM Credit extends to Customer, notwithstanding any prior course of conduct between IBM Credit and Customer. IBM Credit may combine all of its advances to make one debt owed by Customer.

  • Interactive Data The interactive data in eXtensible Business Reporting Language included as an exhibit to the Registration Statement or incorporated by reference in the Registration Statement fairly presents the information called for in all material respects and has been prepared in accordance with the Commission’s rules and guidelines applicable thereto.

  • Data Access Services State Street agrees to make available to the Fund the Data Access Services subject to the terms and conditions of this Addendum and such data access operating standards and procedures as may be issued by State Street from time to time. The Fund shall be able to access the System to (i) originate electronic instructions to State Street in order to (a) effect the transfer or movement of cash or securities held under custody by State Street or (b) transmit accounting or other information (the transactions described in (i)(a) and (i)(b) above are referred to herein as “Client Originated Electronic Financial Instructions”), and (ii) access data for the purpose of reporting and analysis, which shall all be deemed to be Data Access Services for purposes of this Addendum.

  • Network Access Control The VISION Web Site and the Distribution Support Services Web Site (the “DST Web Sites”) are protected through multiple levels of network controls. The first defense is a border router which exists at the boundary between the DST Web Sites and the Internet Service Provider. The border router provides basic protections including anti-spoofing controls. Next is a highly available pair of stateful firewalls that allow only HTTPS traffic destined to the DST Web Sites. The third network control is a highly available pair of load balancers that terminate the HTTPS connections and then forward the traffic on to one of several available web servers. In addition, a second highly available pair of stateful firewalls enforce network controls between the web servers and any back-end application servers. No Internet traffic is allowed directly to the back-end application servers. The DST Web Sites equipment is located and administered at DST’s Winchester data center. Changes to the systems residing on this computer are submitted through the DST change control process. All services and functions within the DST Web Sites are deactivated with the exception of services and functions which support the transfer of files. All ports on the DST Web Sites are disabled, except those ports required to transfer files. All “listeners,” other than listeners required for inbound connections from the load balancers, are deactivated. Directory structures are “hidden” from the user. Services which provide directory information are also deactivated.

  • Exclusive Services Executive shall at all times faithfully, industriously and to the best of his or her ability, experience and talent perform to the satisfaction of the Board and the CEO all of the duties that may be assigned to Executive hereunder and shall devote substantially all of his or her productive time and efforts to the performance of such duties. Subject to the terms of the Employee Confidentiality and Invention Assignment Agreement referred to in Section 5(b), this shall not preclude Executive from devoting time to personal and family investments or serving on community and civic boards, or participating in industry associations, provided such activities do not interfere with his or her duties to the Company, as determined in good faith by the CEO. Executive agrees that he or she will not join any boards, other than community and civic boards (which do not interfere with his or her duties to the Company), without the prior approval of the CEO.

  • License; Use Upon delivery to an Authorized Person or a person reasonably believed by Custodian to be an Authorized Person of the Fund of software enabling the Fund to obtain access to the System (the “Software”), Custodian grants to the Fund a personal, nontransferable and nonexclusive license to use the Software solely for the purpose of transmitting Written Instructions, receiving reports, making inquiries or otherwise communicating with Custodian in connection with the Account(s). The Fund shall use the Software solely for its own internal and proper business purposes and not in the operation of a service bureau. Except as set forth herein, no license or right of any kind is granted to the Fund with respect to the Software. The Fund acknowledges that Custodian and its suppliers retain and have title and exclusive proprietary rights to the Software, including any trade secrets or other ideas, concepts, know-how, methodologies, or information incorporated therein and the exclusive rights to any copyrights, trademarks and patents (including registrations and applications for registration of either), or other statutory or legal protections available in respect thereof. The Fund further acknowledges that all or a part of the Software may be copyrighted or trademarked (or a registration or claim made therefor) by Custodian or its suppliers. The Fund shall not take any action with respect tot the Software inconsistent with the foregoing acknowledgement, nor shall the Fund attempt to decompile, reverse engineer or modify the Software. The Fund may not xxx, sell, lease or provide, directly or indirectly, any of the Software of any portion thereof to any other person or entity without Custodian’s prior written consent. The Fund may not remove any statutory copyright notice or other notice included in the Software or on any media containing the Software. The Fund shall reproduce any such notice on any reproduction of the Software and shall add any statutory copyright notice or other notice to the Software or media upon Custodian’s request.

  • Data Access and Proprietary Information 6.1 The Fund acknowledges that the databases, computer programs, screen formats, report formats, interactive design techniques, and documentation manuals furnished to the Fund by the Transfer Agent as part of the Fund’s ability to access certain Fund Confidential Information maintained by the Transfer Agent on databases under the control and ownership of the Transfer Agent or other third party (“Data Access Services”) constitute copyrighted, trade secret, or other proprietary information of substantial value to the Transfer Agent or other third party (collectively, “Transfer Agent Proprietary Information”). In no event shall Transfer Agent Proprietary Information be deemed Fund Confidential Information. The Fund agrees to treat all Transfer Agent Proprietary Information as proprietary to the Transfer Agent and further agrees that it shall not divulge any Transfer Agent Proprietary Information to any person or organization except as may be provided hereunder. Without limiting the foregoing, the Fund agrees for itself and its employees and agents to:

Time is Money Join Law Insider Premium to draft better contracts faster.