Information User Landscape Sample Clauses

Information User Landscape. Given the wider goals of EUDAT beyond the currently engaged communities, information providers can be split into at least 4 separate categories:  Information providers holding legacy data sets. These are holdings which, while still of use in current research, are no longer being extended or actively developed. Examples of this could be remote sensing data where the instruments are no longer operational or data from now defunct projects which is still useful for ongoing long term monitoring. These providers may have a mature metadata model, but this is not guaranteed and may not fit with any current metadata standards depending on the age of the holdings.  Information providers holding active data sets where new data is being added to the community repository and is under active development. In this case it is likely they will hold a metadata catalogue, but again it may not adhere to any current standards. For example, the WLCG metadata is really only the collection of GUIDs and their resolution to data objects while many other groups have models based on a well defined standards (Dublin Core, CSGDM, EML, etc).  Immature communities which are either developing, or considering the development of, a metadata model to allow simple search and retrieval of metadata associated with forthcoming or ongoing holdings.  ‘Ad-hoc users’ which may want to make use of EUDAT as a ‘dropbox’ for scientific data and have no interest in developing their own metadata catalogue and just want EUDAT to manage their metadata. Each of these information providers will have an impact on scalability which in some respects is difficult to quantify. Ad-hoc users are likely to contribute least information with respect to data on an individual basis, but there are potentially a large number of these. This is likely to be particularly acute in the initial stages of EUDAT roll out to wider communities if a ‘try before you buy’ system is offered to potential providers. Legacy data providers are probably the easiest to quantify (for instance the Sloane Legacy Survey contains 230 million unique imaged objects, and 1,270,000 unique spectra). However, each community would need to provide similar information. The active and immature information providers are the largest unknown. It is difficult to quantify their potential data holding since the impending ‘data tsunami’ is based on both an increase in the volume of data stored, the number of distinct objects stored and the number of communities...
AutoNDA by SimpleDocs

Related to Information User Landscape

  • Tenant Information Copies of the Leases and any financial statements or other financial information of any tenants under the Leases (and the Lease guarantors, if any), written information relative to the tenants’ payment histories, and tenant correspondence, to the extent Seller has the same in its possession;

  • Confidential System Information HHSC prohibits the unauthorized disclosure of Other Confidential Information. Grantee and all Grantee Agents will not disclose or use any Other Confidential Information in any manner except as is necessary for the Project or the proper discharge of obligations and securing of rights under the Contract. Grantee will have a system in effect to protect Other Confidential Information. Any disclosure or transfer of Other Confidential Information by Xxxxxxx, including information requested to do so by HHSC, will be in accordance with the Contract. If Grantee receives a request for Other Confidential Information, Xxxxxxx will immediately notify HHSC of the request, and will make reasonable efforts to protect the Other Confidential Information from disclosure until further instructed by the HHSC. Grantee will notify HHSC promptly of any unauthorized possession, use, knowledge, or attempt thereof, of any Other Confidential Information by any person or entity that may become known to Grantee. Grantee will furnish to HHSC all known details of the unauthorized possession, use, or knowledge, or attempt thereof, and use reasonable efforts to assist HHSC in investigating or preventing the reoccurrence of any unauthorized possession, use, or knowledge, or attempt thereof, of Other Confidential Information. HHSC will have the right to recover from Grantee all damages and liabilities caused by or arising from Grantee or Grantee Agents’ failure to protect HHSC’s Confidential Information as required by this section. IN COORDINATION WITH THE INDEMNITY PROVISIONS CONTAINED IN THE UTC, Xxxxxxx WILL INDEMNIFY AND HOLD HARMLESS HHSC FROM ALL DAMAGES, COSTS, LIABILITIES, AND EXPENSES (INCLUDING WITHOUT LIMITATION REASONABLE ATTORNEYS’ FEES AND COSTS) CAUSED BY OR ARISING FROM Grantee OR Grantee AGENTS FAILURE TO PROTECT OTHER CONFIDENTIAL INFORMATION. Grantee WILL FULFILL THIS PROVISION WITH COUNSEL APPROVED BY HHSC.

  • Services and Third Party Materials A. The tvOS Software may enable access to Apple’s iTunes Store, App Store, Game Center, iCloud and other Apple and third party services, and web sites (collectively and individually, “Services”). Such Services may not be available in all languages or in all countries. Use of these Services requires Internet access and use of certain Services may require an Apple ID, may require you to accept additional terms and may be subject to additional fees. By using this software in connection with an Apple ID, or other Apple Service, you agree to the applicable terms of service for that Service, such as the latest iTunes Store Terms and Conditions, which you may access and review at xxxx://xxx.xxxxx.xxx/legal/itunes/ ww/.

  • Information Handling Implement new/improved system; update incoming publications; circulate publications; identify information source(s) inside and outside the organisation. Grade 5 - Communication: Obtain data from external sources; produce reports; identify need for documents and/or research. Grade 5 - Enterprise: Assist with the development of options for future strategies; assist with planning to match future requirements with resource allocation.

  • PUBLIC WORKS AND BUILDING SERVICES CONTRACTS Work being done under a resulting Authorized User Agreement may be subject to the prevailing wage rate provisions of the New York State Labor Law. Such work will be identified by the Authorized User within the RFQ. See “Prevailing Wage Rates – Public Works and Building Services Contracts’ in Appendix B, Clause 10, OGS General Specifications. Any federal or State determination of a violation of any public works law or regulation, or labor law or regulation, or any OSHA violation deemed "serious or willful" may be grounds for a determination of vendor non-responsibility and rejection of proposal. The Prevailing Wage Case Number for this Contract is PRC# 2014011745. The Prevailing Wage Rates for various occupations and General Provisions of Laws Covering Workers on Article 8 Public Work Contract can be accessed at the following NYS Department of Labor website: xxxxx://xxxxxxxxxxxx.xxxxx.xx.xxx/wpp/xxxxXxxxXxxxxxx.xx?method=showIt  Insert PRC# 2014011745 in the box provided and click Submit.  Click Wage Schedule located underneath the main header of this page. The PDF file may be searched to obtain the Prevailing Wage Rate for a specific occupation. SHORT TERM EXTENSION In the event a replacement Contract has not been issued, any Contract let and awarded hereunder by the State, may be extended unilaterally by the State for an additional period of up to 3 months upon notice to the Contractor with the same terms and conditions as the original Contract including, but not limited to, prices and delivery requirements. With the concurrence of the Contractor, the extension may be for a period of up to 6 months in lieu of 3 months. However, this extension terminates should the replacement Contract be issued in the interim. PROCUREMENT INSTRUCTIONS Authorized Users should refer to the documents attached as Appendix G – Processes and Forms Templates for specific instructions on the usage of this Contract. OGS reserves the right to unilaterally make revisions, changes, additions and/or updates to the documents attached as Appendix G - Processes and Forms Templates without processing a formal amendment and/or modification. SPECIFICATIONS During the term of the Contract, the Authorized User may request Product specifications for particular items that have been included by the Contractor in its Pricing Pages. These specifications will be provided by the Contractor at no cost.

  • Utilities and Appliances (1) The owner must provide all utilities needed to comply with the HQS.

  • Verizon OSS Information 8.5.1 Subject to the provisions of this Section 8, in accordance with, but only to the extent required by, Applicable Law, Verizon grants to CBB a non-exclusive license to use Verizon OSS Information.

  • Exception Where Databases Contain Sufficient Information A Reporting Financial Institution is not required to perform the paper record search described in subparagraph D.2. of this section if the Reporting Financial Institution’s electronically searchable information includes the following:

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Management Information Systems A. The CONTRACTOR shall maintain a process that collects, analyzes, integrates, and reports data. (42 C.F.R. § 438.242(a); Cal. Code Regs., tit. 9, § 1810.376.) This process shall provide information on areas including, but not limited to, utilization, claims, grievances, and appeals. (42 C.F.R. § 438.242(a).)

Time is Money Join Law Insider Premium to draft better contracts faster.