Priority 2—Database Impaired Sample Clauses

Priority 2—Database Impaired. The Production Database is not operating with full capability but is still operational. Target Response Time: four (4) hours. Some examples of Priority 2 calls include: • Impaired or broken functionality with significant impact to applications and/or Database(s) • Frequent application failure but no data loss • Serious but predictable management system failure • Significant system performance degradation • Networking issues preventing a majority of users from connecting to the Database
AutoNDA by SimpleDocs

Related to Priority 2—Database Impaired

  • Server Software Subject to the terms and conditions of this XXXX, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Site Access Dell requires the right to access the APEX System in a timely way and as provided in the Service Offering Description to provide the Support Services. Failure to ensure that Customer provides Dell with timely access to a Site will relieve Dell of the Support Services obligations and Dell may also, at Dell’s discretion, suspend the APEX Service.

  • Search Results; Lien Terminations Certified copies of Uniform Commercial Code search reports dated a date reasonably near to the Closing Date, listing all effective financing statements which name any Loan Party (under their present names and any previous names) as debtors, together with (a) copies of such financing statements, (b) payoff letters evidencing repayment in full of all Debt to be Repaid, the termination of all agreements relating thereto and the release of all Liens granted in connection therewith, with Uniform Commercial Code or other appropriate termination statements and documents effective to evidence the foregoing (other than Liens permitted by Section 11.2) and (c) such other Uniform Commercial Code termination statements as the Administrative Agent may reasonably request.

  • Subordination May Not Be Impaired (a) No right of any present or future holder of any Senior Indebtedness of the Company to enforce subordination as herein provided shall at any time in any way be prejudiced or impaired by any act or failure to act on the part of the Company or by any act or failure to act, in good faith, by any such holder, or by any noncompliance by the Company with the terms, provisions and covenants of this Indenture, regardless of any knowledge thereof that any such holder may have or otherwise be charged with. (b) Without in any way limiting the generality of the foregoing paragraph, the holders of Senior Indebtedness of the Company may, at any time and from time to time, without the consent of or notice to the Trustee or the holders of the Debentures, without incurring responsibility to the holders of the Debentures and without impairing or releasing the subordination provided in this Article XVI or the obligations hereunder of the holders of the Debentures to the holders of such Senior Indebtedness, do any one or more of the following: (i) change the manner, place or terms of payment or extend the time of payment of, or renew or alter, such Senior Indebtedness, or otherwise amend or supplement in any manner such Senior Indebtedness or any instrument evidencing the same or any agreement under which such Senior Indebtedness is outstanding; (ii) sell, exchange, release or otherwise deal with any property pledged, mortgaged or otherwise securing such Senior Indebtedness; (iii) release any Person liable in any manner for the collection of such Senior Indebtedness; and (iv) exercise or refrain from exercising any rights against the Company and any other Person.

  • Records Maintenance; Access Contractor shall maintain all financial records relating to this Contract in accordance with generally accepted accounting principles. In addition, Contractor shall maintain any other records, books, documents, papers, plans, records of shipments and payments and writings of Contractor, whether in paper, electronic or other form, that are pertinent to this Contract (“Records”) in such a manner as to clearly document Contractor's performance. Contractor acknowledges and agrees that Agency and the Oregon Secretary of State's Office and the federal government and their duly authorized representatives will have access to such financial records and other Records that are pertinent to this Contract, whether in paper, electronic or other form, to perform examinations and audits and make excerpts and transcripts. Contractor shall retain and keep accessible all such financial records and other Records for a minimum of 6 years, or such longer period as may be required by applicable law, following final payment and termination of this Contract, or until the conclusion of any audit, controversy or litigation arising out of or related to this Contract, whichever date is later.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CSTC chooses to subtend a Verizon access Tandem, CSTC’s NPA/NXX must be assigned by CSTC to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG. 9.2.2 CSTC shall establish Access Toll Connecting Trunks pursuant to applicable access Tariffs by which it will provide Switched Exchange Access Services to Interexchange Carriers to enable such Interexchange Carriers to originate and terminate traffic to and from CSTC’s Customers. 9.2.3 The Access Toll Connecting Trunks shall be two-way trunks. Such trunks shall connect the End Office CSTC utilizes to provide Telephone Exchange Service and Switched Exchange Access to its Customers in a given LATA to the access Tandem(s) Verizon utilizes to provide Exchange Access in such LATA. 9.2.4 Access Toll Connecting Trunks shall be used solely for the transmission and routing of Exchange Access to allow CSTC’s Customers to connect to or be connected to the interexchange trunks of any Interexchange Carrier which is connected to a Verizon access Tandem.

  • Evaluation Software If the Software is an evaluation version or is provided to You for evaluation purposes, then, unless otherwise approved in writing by an authorized representative of Licensor, Your license to use the Software is limited solely for internal evaluation purposes in non-production use and in accordance with the terms of the evaluation offering under which You received the Software, and expires 90 days from installation (or such other period as may be indicated within the Software). Upon expiration of the evaluation period, You must discontinue use of the Software, return to an original state any actions performed by the Software, and delete the Software entirely from Your system and You may not download the Software again unless approved in writing by an authorized representative of Licensor. The Software may contain an automatic disabling mechanism that prevents its use after a certain period of time. RESTRICTIONS

  • Priorities If the Trustee collects any money pursuant to this Article 6, it shall pay out the money in the following order:

  • Access Rights Upon reasonable notice and supervision by the Granting Party, and subject to any required or necessary regulatory approvals, either the Connecting Transmission Owner or Developer (“Granting Party”) shall furnish to the other of those two Parties (“Access Party”) at no cost any rights of use, licenses, rights of way and easements with respect to lands owned or controlled by the Granting Party, its agents (if allowed under the applicable agency agreement), or any Affiliate, that are necessary to enable the Access Party to obtain ingress and egress at the Point of Interconnection to construct, operate, maintain, repair, test (or witness testing), inspect, replace or remove facilities and equipment to: (i) interconnect the Large Generating Facility with the New York State Transmission System; (ii) operate and maintain the Large Generating Facility, the Attachment Facilities and the New York State Transmission System; and (iii) disconnect or remove the Access Party’s facilities and equipment upon termination of this Agreement. In exercising such licenses, rights of way and easements, the Access Party shall not unreasonably disrupt or interfere with normal operation of the Granting Party’s business and shall adhere to the safety rules and procedures established in advance, as may be changed from time to time, by the Granting Party and provided to the Access Party. The Access Party shall indemnify the Granting Party against all claims of injury or damage from third parties resulting from the exercise of the access rights provided for herein.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!