Scalability and Extensibility Sample Clauses

Scalability and Extensibility. The Contractor will deliver the highest levels of reliability and scalability to support any State IT initiative now and in the future. The Contractor’s System will be co-located (does not share any resources with other datacenter clients) and will be completely isolated on the Contractor’s own hardware. The Contractor’s System shall be delivered from a highly configurable network load balanced (NLB) web farm of virtualized data center servers (these servers shall be clones of each other). The Contractor will not only keep up with the latest trends or changes but also adopt them when proven stable. The Contractor will have the Scalability and Extensibility to: 1. Have the ability to meet future growth 2. Be configurable 3. Have the flexibility to keep up with changing technology and regulatory needs 4. Be easy to maintain The Contractor’s system will scale for multiple business units with different missions. (For example, if Department ‘x’ and Department ‘y’ both want to take advantage of automated case management, the Contractor’s System shall handle increasing Users while maintaining responsiveness and insuring security, privacy, etc.)
AutoNDA by SimpleDocs

Related to Scalability and Extensibility

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Quality and Extent of Services The Board considered the terms of the Agreement, including the scope of advisory services provided under the Agreement. The Board noted that, under the Agreement, XXXX provides portfolio management services to the Fund and that, pursuant to a separate administrative services agreement, DIMA provides administrative services to the Fund. The Board considered the experience and skills of senior management and investment personnel and the resources made available to such personnel. The Board also considered the risks to XXXX in sponsoring or managing the Fund, including financial, operational and reputational risks, the potential economic impact to XXXX from such risks and XXXX’s approach to addressing such risks. The Board reviewed the Fund’s performance over short-term and long-term periods and compared those returns to various agreed-upon performance measures, including market index(es) and a peer universe compiled using information supplied by Morningstar Direct (“Morningstar”), an independent fund data service. The Board also noted that it has put into place a process of identifying “Funds in Review” (e.g., funds performing poorly relative to a peer universe), and receives additional reporting from XXXX regarding such funds and, where appropriate, XXXX’s plans to address underperformance. The Board believes this process is an effective manner of identifying and addressing underperforming funds. Based on the information provided, the Board noted that, for the one-, three- and five-year periods ended December 31, 2020, the Fund’s performance (Class A shares) was in the 2nd quartile of the applicable Morningstar universe (the 1st quartile being the best performers and the 4th quartile being the worst performers). The Board also observed that the Fund has underperformed its benchmark in the one-, three- and five-year periods ended December 31, 2020. Fees and Expenses. The Board considered the Fund’s investment management fee schedule, operating expenses and total expense ratios, and comparative information provided by Broadridge Financial Solutions, Inc. (“Broadridge”) and the Fee Consultant regarding investment management fee rates paid to other investment advisors by similar funds

  • Responsibility and Control Notwithstanding any other provision of this Agreement, it is understood and agreed that the Trust reserves the right to direct, approve or disapprove any action hereunder taken on its behalf by the Subadviser, provided, however, that the Subadviser shall not be liable for any losses to the Trust resulting from the Trust’s direction, or from the Trust’s disapproval of any action proposed to be taken by the Subadviser.

  • Experience, Financial Capability and Suitability Subscriber is: (i) sophisticated in financial matters and is able to evaluate the risks and benefits of the investment in the Shares and (ii) able to bear the economic risk of its investment in the Shares for an indefinite period of time because the Shares have not been registered under the Securities Act (as defined below) and therefore cannot be sold unless subsequently registered under the Securities Act or an exemption from such registration is available. Subscriber is capable of evaluating the merits and risks of its investment in the Company and has the capacity to protect its own interests. Subscriber must bear the economic risk of this investment until the Shares are sold pursuant to: (i) an effective registration statement under the Securities Act or (ii) an exemption from registration available with respect to such sale. Subscriber is able to bear the economic risks of an investment in the Shares and to afford a complete loss of Subscriber’s investment in the Shares.

  • Financial Viability and Regulatory Compliance 2.6.1 Contractor warrants and represents that its corporate entity is in good standing with all applicable federal, state, and local licensing authorities and that it possesses all requisite licenses to perform the services required by this contract. Contractor further warrants and represents that it owes no outstanding delinquent federal, state or local taxes or business assessments. 2.6.2 Contractor agrees to promptly disclose to the MPHA any IRS liens or licensure suspension or revocation that may adversely affect its capacity to perform the services outlined within this contract. The failure by Contractor to disclose such issue to the MPHA in writing within 5 days of such notification received will constitute a material breach of this contract. 2.6.3 Contractor further agrees to promptly disclose to the MPHA any change of more than 50% of its ownership and/or any declaration of bankruptcy that Contractor may undergo during the term(s) of this contract. The failure of Contractor to disclose any change of more than 50% of its ownership and/or its declaration of bankruptcy within 5 days of said actions shall constitute a material breach of this contract. 2.6.4 All disclosures made pursuant to this section of the contract shall be made in writing and submitted to MPHA within the time periods required herein.

  • Geographic Area and Sector Specific Allowances, Conditions and Exceptions The following allowances and conditions shall apply where relevant. Where the Employer does work which falls under the following headings, the Employer agrees to pay and observe the relevant respective conditions and/or exceptions set out below in each case.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Duration and Scope of Covenants If any court or other decision-maker of competent jurisdiction determines that any of the Executive’s covenants contained in this Agreement, including, without limitation, any of the Restrictive Covenants, or any part thereof, is unenforceable because of the duration or geographical scope of such provision, then, after such determination has become final and unappealable, the duration or scope of such provision, as the case may be, shall be reduced so that such provision becomes enforceable and, in its reduced form, such provision shall then be enforceable and shall be enforced.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Data Return and Destruction of Data (a) Protecting PII from unauthorized access and disclosure is of the utmost importance to the EA, and Contractor agrees that it is prohibited from retaining PII or continued access to PII or any copy, summary or extract of PII, on any storage medium (including, without limitation, in secure data centers and/or cloud-based facilities) whatsoever beyond the period of providing Services to the EA, unless such retention is either expressly authorized for a prescribed period by the Service Agreement or other written agreement between the Parties, or expressly requested by the EA for purposes of facilitating the transfer of PII to the EA or expressly required by law. As applicable, upon expiration or termination of the Service Agreement, Contractor shall transfer PII, in a format agreed to by the Parties to the EA. (b) If applicable, once the transfer of PII has been accomplished in accordance with the EA’s written election to do so, Contractor agrees to return or destroy all PII when the purpose that necessitated its receipt by Contractor has been completed. Thereafter, with regard to all PII (including without limitation, all hard copies, archived copies, electronic versions, electronic imaging of hard copies) as well as any and all PII maintained on behalf of Contractor in a secure data center and/or cloud-based facilities that remain in the possession of Contractor or its Subcontractors, Contractor shall ensure that PII is securely deleted and/or destroyed in a manner that does not allow it to be retrieved or retrievable, read or reconstructed. Hard copy media must be shredded or destroyed such that PII cannot be read or otherwise reconstructed, and electronic media must be cleared, purged, or destroyed such that the PII cannot be retrieved. Only the destruction of paper PII, and not redaction, will satisfy the requirements for data destruction. Redaction is specifically excluded as a means of data destruction. (c) Contractor shall provide the EA with a written certification of the secure deletion and/or destruction of PII held by the Contractor or Subcontractors. (d) To the extent that Contractor and/or its subcontractors continue to be in possession of any de-identified data (i.e., data that has had all direct and indirect identifiers removed), they agree not to attempt to re-identify de-identified data and not to transfer de-identified data to any party.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!