Identification of user base, legacy systems and service providers Sample Clauses

Identification of user base, legacy systems and service providers. Mirroring the essential finding in the workshops with the industry partners it has been recognized as significant that the discussed possible use scenarios can be treated as very generic and work performed in one of the scenarios can definitely be used supporting the other scenarios. This gave the consortium the assurance that the planned outcome of the project is not only suitable for the participating industry partners but also applicable to the rest of the European or global acting industries which intend to start with service oriented product offers that are based on intangible assets. No real legacy systems, which could be compared with the aim of the SmartVortex project were identified. Similar approaches but without the planned performance, power, elegance and user friendliness could be found in “Analog Recording Technologies” or “Hybrid Computing Equipment”. But this technology is outdated today and not able to cover the filter and computation process of systems that require fast and immediate access to succinct case describing information and is very limited in the threshold or boundary condition management and therefore not able to be used in today‟s digital design and verification world of functional engineering. Other systems like data logging systems can only cover the specific predefined situations, but are not able to perform complex computing tasks with large and fast changing data streams. One of the important technologies which can be used to differentiate the system status and behavior is pattern recognition which cannot be done based on the above mentioned technologies. Real service providers which are using comparable technologies are not really visible or they are part of the SmartVortex research team like  Alkit, which has done measurement of test drives in the automotive and tire industries establishing wireless and broadband technology to transmit the data from the vehicle to the engineers in the laboratories or  InConTec where the founders been for many years been involved in simulation of very complex electromagnetic behaviors of printed and integrated circuits which are producing extremely large data volume simulating radiation emissions. Both companies which are active in this market are keen to get technologies as proposed in the SmartVortex project to use data stream sources and management accretions to solve problems easier and better in their market segment. The review of the possible competition has not brought evident r...
AutoNDA by SimpleDocs

Related to Identification of user base, legacy systems and service providers

  • Review Systems; Personnel It will maintain business process management and/or other systems necessary to ensure that it can perform each Test and, on execution of this Agreement, will load each Test into these systems. The Asset Representations Reviewer will ensure that these systems allow for each Review Receivable and the related Review Materials to be individually tracked and stored as contemplated by this Agreement. The Asset Representations Reviewer will maintain adequate staff that is properly trained to conduct Reviews as required by this Agreement.

  • The Web Services E-Verify Employer Agent agrees to, consistent with applicable laws, regulations, and policies, commit sufficient personnel and resources to meet the requirements of this MOU.

  • Disclosure to numbering service providers (a) Any Finance Party may disclose to any national or international numbering service provider appointed by that Finance Party to provide identification numbering services in respect of this Agreement, the Facility and/or one or more Obligors the following information: (i) names of Obligors; (ii) country of domicile of Obligors; (iii) place of incorporation of Obligors; (iv) date of this Agreement; (v) the names of the Agent and the Arranger; (vi) date of each amendment and restatement of this Agreement; (vii) amount of Total Commitments; (viii) currencies of the Facility; (ix) ranking of the Facility; (x) Termination Date for the Facility; (xi) changes to any of the information previously supplied pursuant to paragraphs (i) to (xi) above; and (xii) such other information agreed between such Finance Party and the Company, to enable such numbering service provider to provide its usual syndicated loan numbering identification services. (b) The Parties acknowledge and agree that each identification number assigned to this Agreement, the Facility and/or one or more Obligors by a numbering service provider and the information associated with each such number may be disclosed to users of its services in accordance with the standard terms and conditions of that numbering service provider. (c) Each Obligor represents that none of the information set out in paragraphs (i) to (xii) of paragraph (a) above is, nor will at any time be, unpublished price-sensitive information. (d) The Agent shall notify the Company and the other Finance Parties of: (i) the name of any numbering service provider appointed by the Agent in respect of this Agreement, the Facility and/or one or more Obligors; and (ii) the number or, as the case may be, numbers assigned to this Agreement, the Facility and/or one or more Obligors by such numbering service provider.

  • Access to Personal Information by Subcontractors Supplier agrees to require any subcontractors or agents to which it discloses Personal Information under this Agreement or under any SOW to provide reasonable assurance, evidenced by written contract, that they will comply with the same or substantially similar confidentiality, privacy and security obligations with respect to such Personal Information as apply to Supplier under this Agreement or any SOW. Supplier shall confirm in writing to DXC that such contract is in place as a condition to DXC’s approval of use of a subcontractor in connection with any SOW. Upon request of DXC, Supplier will provide to DXC a copy of the subcontract or an extract of the relevant clauses. Supplier shall ensure that any failure on the part of any subcontractor or agent to comply with the Supplier obligations under this Agreement or any SOW shall be grounds to promptly terminate such subcontractor or agent. If during the term of this Agreement or any SOW, DXC determines, in its exclusive discretion, that any Supplier subcontractor or agent cannot comply with the Supplier obligations under this Agreement or with any SOW, then DXC may terminate this Agreement in whole or in part (with respect to any SOW for which such subcontractor or agent is providing services), if not cured by Supplier within the time prescribed in the notice of such deficiency.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Changes in Equipment, Systems, Etc USBFS reserves the right to make changes from time to time, as it deems advisable, relating to its systems, programs, rules, operating schedules and equipment, so long as such changes do not adversely affect the services provided to the Trust under this Agreement.

  • Compensation for Providing Information The Party requesting Information agrees to reimburse the other Party for the reasonable out-of-pocket costs, if any, of creating, gathering and copying such Information, to the extent that such costs are incurred for the benefit of the requesting Party.

  • Access to PHI Business Associate shall provide access to PHI in a Designated Record Set to Covered Entity or as directed by Covered Entity to an Individual to meet the requirements under 45 CFR § 164.524. Business Associate shall provide such access in the time and manner reasonably designated by Covered Entity. Within three (3) business days, Business Associate shall forward to Covered Entity for handling any request for access to PHI that Business Associate directly receives from an Individual.

  • Access to Personnel File Each employee shall have reasonable access to his/her personnel file for the purpose of reviewing any evaluations or formal disciplinary notations contained therein, in the presence of the Director of Personnel or designate. An employee has the right to request copies of any evaluations in this file.

  • Passwords and Employee Access Provider shall secure usernames, passwords, and any other means of gaining access to the Services or to Student Data, at a level suggested by Article 4.3 of NIST 800-63-3. Provider shall only provide access to Student Data to employees or contractors that are performing the Services. Employees with access to Student Data shall have signed confidentiality agreements regarding said Student Data. All employees with access to Student Records shall pass criminal background checks.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!