JBoss Enterprise Middleware Use Cases Sample Clauses

JBoss Enterprise Middleware Use Cases. Subscription Services are provided for JBoss Enterprise Middleware Software Subscriptions only when used for its supported purpose (“Use Case”) as set forth at: xxxxx://xxxxxx.xxxxxx.xxx/support/offerings/jboss/.
AutoNDA by SimpleDocs
JBoss Enterprise Middleware Use Cases. Subscription Services are provided for JBoss Enterprise Middleware Software Subscriptions only when used for its supported purpose (“Use Case”) as set forth at: xxxxx://xxxxxx.xxxxxx.xxx/support/offerings/jboss/. 1. JBoss Enterprise Middleware 软 件 订 阅 1.1 JBoss Enterprise Middleware 软件订阅概述。在购买 JBoss Enterprise Middleware 的软件订阅(如 JBoss Enterprise Application Platform)时,贵方将收到: 补充软件”),具体取决于下面第 1.2 节规定的 JBoss补充软件的条件; 1.2 JBoss 补充软件条件。JBoss 补充软件的软件访问途径和软件维护仅用于开发用途,并且适用于最多 25 名用户, 1.3 JBoss Enterprise Middleware 管理和支持选项。 (a) 作为独立的产品,或者在某些情况下作为受管产品,以及 (b) 随附购买标准或高级支持。 1.4 JBoss Enterprise Middleware 使用案例。
JBoss Enterprise Middleware Use Cases. Subscription Services are provided for JBoss Enterprise Middleware Software Subscriptions only when used for its supported purpose (“Use Case”) as set forth at: xxxxx://xxxxxx.xxxxxx.xxx/xxxxxxx/xxxxxxxxx/xxxxx/. 1. JBoss Enterprise Middleware 소프트웨어 서브스크립션 1.1 JBoss Enterprise Middleware 소프트웨어 서브스크립션 개요. (JBoss Enterprise Application Platform 등) JBoss Enterprise Middleware에 대한 소프트웨어 서브스크립션을 구매하는 경우 다음 사항을 제공받는다. 1.2 Supplemental JBoss 소프트웨어 조건. Supplemental JBoss Software에 대한 소프트웨어 접속 및 소프트웨어 유지보수는 개발용으로만 의도되어 사용 가능하며 구매한 JBoss Enterprise Middleware 소프트웨어의 각 16코어 밴드 서브스크립션에 대한 최대 25명의 사용자를 위한 것이다. 생산용으로 또는 25명이 넘는 사용자에 대하여 Supplemental JBoss Software를 배치하거나 사용하는 경우 배치하거나 사용하는 각 단위에 대하여 적절한 소프트웨어 서브스크립션을 구매하는 데 동의하는 것이다. Red Hat의 오픈 소스 보장 프로그램은 (위의 예에서 JBoss Enterprise Application Platform 등) 고객이 구매한 JBoss Enterprise Middleware 소프트웨어 서브스크립션에 적용되며 Supplemental JBoss Software에는 적용되지 않습니다. 1.3 JBoss Enterprise Middleware 관리 및 지원 옵션. JBoss Enterprise Middleware 서브스크립션은 (a) 독립형 제품, 또는 일부의 경우 관리된 오퍼링으로서 (b) 표준 또는 프리미엄 지원과 함께 구매할 수 있다. 1.4 JBoss Enterprise Middleware 사용 사례. 서브스크립션 서비스는 다음에 명시한 대로 지원용으로 사용되는 JBoss Enterprise Middleware 소프트웨어 서브스크립션에 대해서만 제공된다(“사용 사례”).

Related to JBoss Enterprise Middleware Use Cases

  • Software Use Case Red Hat Enterprise Linux Developer Suite Subscription Services for Red Hat Enterprise Linux Developer Suite are available for Development Purposes only.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Small and medium-sized enterprises 1. The Parties will promote a favourable environment for the development of the small and medium enterprises (SME) on the basis of strengthening of the relevant private and governmental bodies, as well as the exchange of experiences and good practices with the SME. 2. Cooperation shall include, among other subjects: (a) the designing and development of mechanisms to encourage partnership and productive chain linkage development; (b) development of human resources and management skills to increase the knowledge of the Chinese and Peruvian markets; (c) defining and developing methods and strategies for clusters development; (d) increasing access to information regarding mandatory procedures and any other relevant information for an SME exporter; (e) defining technological transference: programs oriented to transfer technological innovation to SME and to improve their productivity; (f) increasing access to information on technological promotion programs for SME and financial support and encouragement programs for SME; (g) supporting new exporting SME (sponsorship, credits and guarantees, seed capital); and (h) encouraging partnership and information exchange for SME financing institutions (credits, banks, guarantee organizations, seed capital firms). 3. Cooperation shall be developed, among other activities, through: (a) information exchange; (b) conferences, seminars, experts dialogue and training programs with experts; and (c) promoting contacts between economic operators, encouraging opportunities for industrial and technical prospecting.

  • Foreign-Owned Companies in Connection with Critical Infrastructure If Texas Government Code, Section 2274.0102(a)(1) (relating to prohibition on contracts with certain foreign-owned companies in connection with critical infrastructure) is applicable to this Contract, pursuant to Government Code Section 2274.0102, Contractor certifies that neither it nor its parent company, nor any affiliate of Contractor or its parent company, is: (1) majority owned or controlled by citizens or governmental entities of China, Iran, North Korea, Russia, or any other country designated by the Governor under Government Code Section 2274.0103, or (2) headquartered in any of those countries.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Workstation/Laptop encryption All workstations and laptops that process and/or store DHCS PHI or PI must be encrypted using a FIPS 140-2 certified algorithm which is 128bit or higher, such as Advanced Encryption Standard (AES). The encryption solution must be full disk unless approved by the DHCS Information Security Office.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Certified and Minority Business Enterprises Reports Upon Customer request, the Contractor shall report to the requesting Customer the Contractor’s spend with certified and other minority business enterprises in the provision of commodities or services related to the Customer’s orders. These reports shall include the period covered, the name, minority code, and Federal Employer Identification Number of each minority business utilized during the period; commodities and services provided by the minority business enterprise, and the amount paid to each minority business enterprise on behalf of the Customer.

  • Certification as Small Contractor or Minority Business Enterprise This paragraph was intentionally left blank.

  • Television Equipment Recycling Program If this Contract is for the purchase or lease of covered television equipment, then Contractor certifies that it is compliance with Subchapter Z, Chapter 361 of the Texas Health and Safety Code related to the Television Equipment Recycling Program.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!