Service Models Sample Clauses

Service Models. Software as a Service (SaaS) ‐ The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure2. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web‐based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user‐specific application configuration settings. Platform as a Service (PaaS) ‐ The capability provided to the consumer is to deploy onto the cloud infrastructure consumer‐created or acquired applications created using programming languages, libraries, services, and tools supported by the provider.3 The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application‐hosting environment. Infrastructure as a Service (IaaS) ‐ The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls). Deployment Models: Private cloud ‐ The cloud infrastructure is provisioned for exclusive use by a single organization comprising multiple consumers (e.g., business units). It may be owned, managed, and operated by the organization, a third party, or some combination of them, and it may exist on or off premises. Community cloud ‐ The cloud infrastructure is provisioned for exclusive use by a specific community of consumers from organizations that have shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be owned, managed, and operated by one or more of the organizations in the community, a third party, or some combination of them, and it may exist on or off premises. Public cloud ‐ The cloud infrastructure is provisioned for open use by the general public. It may be owned, managed, and operated by a business, academic, or gov...
AutoNDA by SimpleDocs
Service Models. Minnesota Family Investment Program (MFIP) and the Diversionary Work Program (DWP) 1. Do you have culturally specific employment services for different racial/ethnic groups? ☒ No ☐ Yes, check all that apply. ☐ African American ☐ African immigrant ☐ American IndianAsian American ☐ Asian immigrant ☐ Hispanic/ Latino ☐ Other, please specify in the text box below. 2. What strategies do you use for hard‐to‐engage participants? Check all that apply. ☐ Home visits ☒ Sanction outreach services ☒ Off‐site meeting opportunities ☒ Incentives, please specify: ☒ Other, please specify in the text box below. Intra and inter agency collaboration 3. What types of job development do you do? Check all that apply. ☐ Sector job development ☒ Individual job development ☐ Other, please specify in the text box below. 4. Do you have an ongoing job development partnership or sector base with community employers to help participants with employment? ☐ No ☒ Yes, check all activities employer provides. ☒ Interview opportunitiesJob skills trainingJob placementJob shadowing ☒ On‐site job trainingWork experience ☐ Helps plan training programs ☐ Other, please specify in the text box below Internships 5. Do you provide job retention services to employed participants while they are receiving MFIP? ☐ No ☒ Yes, check all that apply. ☒ Available to assist with issues that develop on the jobFinancial planningSoft skills training ☒ Mentoring ☒ Transportation ☒ Personal contact with the employee and how often: Monthly or as requested ☐ Other, please specify in the text box below. ☐ Less than 3 months ☐ 6 months ☒ 12 months ☐ Other: 6. Do you provide job advancement services to employed participants? ☐ No ☒ Yes, check all that apply. ☒ Career laddering ☒ Networking ☒ Coaching/mentoring ☒ Ongoing job search ☒ Education/training ☐ Other, please specify in the text box below. 7. Do you utilize any career pathways programs or skill assessment and credentialing programs for your participants? ☐ No ☒ Yes, check all that apply. ☒ Pathways to Prosperity (P2P) ☐ Work Keys ☐ National Career Readiness Certificate (NCRC) ☒ Other: Northstar Digital Literacy 1. Do you have professionals available to assist with FSS cases? ☒ No ☐ Yes, check all that apply. ☒ Adult Mental Health professional ☒ Psychologist ☒ Adult Rehabilitation Mental Health ☒ Public Health Nurse Services (ARMHS) worker ☒ Social Worker ☒ Chemical Health professional ☒ Vocational Rehabilitation worker ☒ Children’s Mental Heal...
Service Models. Site Patrol Services presently offer five (5) levels of service including: Central Office; Regional Office; Enterprise Office; Branch Office; and Remote Office, each as stated in the Customer Order. Each level of service includes provisioning and installation; security policy change management; 24x7 security and performance monitoring; Security Incident Rapid ResponseSM emergency intervention; security patches/ software updates as determined by Level 3; and on-site field service presence for hardware replacement. There are a number of elective service, application and platform options available for each service model, each as stated in the Customer Order, including: priority provisioning; Site Patrol 24 x 7 / 4-Hour On-Site Response (where available); a high availability offering (providing virtual router redundancy protocol); authentication support using Check Point's LDAP technology, or customer provided authentication option; Site Patrol Advanced Services Time and Materials Support; remote access client with personal firewall capabilities for offsite employees; encryption acceleration cards; additional network interface cards; and memory upgrades.
Service Models. VPNA Services includes two service models, "Dedicated Site-to-Site" and "Remote Access", both of which offer the following with respect to the Level 3-managed CPE: remote, telephonic installation assistance, 24 x 7 management and monitoring of a limited number of specified CPEs, software upgrades (as determined necessary by Level 3), basic CPE maintenance, and CPE read-only account for usage reporting. "Dedicated Site-to-Site" VPNA Service enables the establishment of secure communications channels between geographically separated sites through the Internet using IPsec with 3DES encryption and digital certificate authentication of CPE. "Remote Access" VPNA Service enables the establishment of secure communications channels between Customer's remote access users and the CPE through dial up, Ethernet, DSL, cable modem or other connectivity to the Internet employing IPsec with DES or 3DES encryption, and either digital certificate or RADIUS authentication. Optional services (which are subject to additional charges), as stated in the Customer Order, are also available, and include: Onsite installation service (where available); Off-hours (as defined by Level 3) telephone installation assistance; Xxxxx 0 Xxxx Xxxx support (to assist with deployment of, and individual support for, the Client); onsite cold spare CPEs; on-site field service and/or technical support (subject to geographic limitations); and configuration and support of extranet tunnels between CPEs and other devices.
Service Models. The traditional breakdown of the service models offered by Cloud service providers is depicted in Figure 2 [16].
Service Models. Software as a Service (SaaS) ‐ The capability provided to the consumer is to use the provider’s applications running on a cloud infrastructure2. The applications are accessible from various client devices through either a thin client interface, such as a web browser (e.g., web‐based email), or a program interface. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user‐specific application configuration settings. Platform as a Service (PaaS) ‐ The capability provided to the consumer is to deploy onto the cloud infrastructure consumer‐created or acquired applications created using programming languages, libraries, services, and tools supported by the provider.3 The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly configuration settings for the application‐hosting environment. Infrastructure as a Service (IaaS) ‐ The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).
Service Models. Overall Commitment to Change 2.1.1 Implementing Community Healthcare Networks (CHNs) and associated operating model for Community Services (CHO) An integrated care system is one which puts the patient at the centre of system design and delivery and is well organised and coordinated to manage costs. Community Healthcare Networks (CHNs) have been identified as the core unit of healthcare service provision and co-ordination within the community in order to ensure greater alignment of service provision for integrated care across care domains. Each CHO is divided into Community Healthcare Networks (96 nationally) which are comprised of circa 50,000 population. CNH managers (Network Managers) will manage the delivery of primary care services and coordinate the integration of services within/outside CHNs and the acute hospital system. Implementation of the networks will commence in 2019 with the establishment of nine learning sites involving the management of primary care staff by the network manager, working collaboratively with community nursing and GPs. In CHNs, the move to collaborative, multidisciplinary working that encourages primary and secondary care to be aligned in one system closer to the community, will facilitate a more streamlined coordinated transfer of care and improved service user experience. Multidisciplinary teams convey many benefits to both the patients and the health professionals working on the team. These include improved health outcomes and enhanced satisfaction for clients, and the more efficient use of resources and enhanced job satisfaction for team members. In the above context each GP Practice will cooperate with and support the implementation of Community Healthcare Networks (CHNs) and the associated operating model for community services (CHOs) in line with the terms of this agreement and the obligations outlined in the table below. At CHN level the GP lead will be part of a local management structure and team. This team will have responsibility and accountability for the management and delivery of primary care services within the network and the integration of other services required to support the CHN population. Heads of Discipline will continue to provide clinical governance The CHN will be led by a Network Manager working closely with the GP lead and the Asst. Dir. of Nursing. There will be nine CHN GP Leads in the learning sites in the first instance and thereafter, following successful deployment of the model, in each of t...
AutoNDA by SimpleDocs
Service Models. Supercomputers are dedicated resources with restricted user permissions, to ensure optimal use of the computational resource for software execution. Supercomputers provide dedicated CPU time on systems consisting of a collection of specialized computing nodes. These nodes are usually equipped with multiple processors (CPUs and/or GPUs) and fast memory access, interconnected by ultrafast and reliable network systems which allow efficient exploitation of the high level of parallelism by the modern software. The multiple nodes of a supercomputer are generally constructed with similar components, facilitating tuning and optimisation of codes across the entire machine for the architecture provided. Specialized file systems (e.g. LUSTRE, GPFS) are usually coupled with the compute elements to allow fast access to the temporary files created and required during the simulation. In many cases, longer-term raw or processed data needs to be archived in a safe and secure environment. Data storage services are also provided by many HPC centres. These services are designed for long-term storage of large quantities of files, and are commonly interfaced with tools for the backup and preservation of archived data. Supercomputing centers support a diverse range of applications and simulation software. The full software distribution is centrally managed and provided by specialists in order to run optimally on the target hardware. In many cases, HPC centres also provide access to specialized tools for remote data visualization and high-performance data analysis which may not be available at the user’s site. The expertise of HPC centre staff also plays a key role in allowing researchers to exploit the computing power available to drive their investigations forward. Users can request general support as well as consultancy for their computational problems: from support for improving software performance or implementation of new algorithms to improved hardware usage and runtime tuning.

Related to Service Models

  • Service Providing Methodology 1.3.1 Party A and Party B agree that during the term of this Agreement, where necessary, Party B may enter into further service agreements with Party A or any other party designated by Party A, which shall provide the specific contents, manner, personnel, and fees for the specific services. 1.3.2 To fulfill this Agreement, Party A and Party B agree that during the term of this Agreement, where necessary, Party B may enter into equipment or property leases with Party A or any other party designated by Party A which shall permit Party B to use Party A’s relevant equipment or property based on the needs of the business of Party B. 1.3.3 Party B hereby grants to Party A an irrevocable and exclusive option to purchase from Party B, at Party A’s sole discretion, any or all of the assets and business of Party B, to the extent permitted under PRC law, at the lowest purchase price permitted by PRC law. The Parties shall then enter into a separate assets or business transfer agreement, specifying the terms and conditions of the transfer of the assets.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Third Party Software The Software may contain third party software which requires notices and/or additional terms and conditions. Such required Third Party Software notices and/or additional terms and conditions are located at xxxxx://xxx.xxxxxxxxxxxxxx.xxx/xxxx-third-party/ (or a successor website thereto) and are made a part of and incorporated by reference into this Agreement.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Computer Software The Grantee certifies that it has appropriate systems and controls in place to ensure that state funds will not be used in the performance of this Grant Agreement for the acquisition, operation, or maintenance of computer software in violation of copyright laws.

  • COMMERCIAL COMPUTER SOFTWARE If performance involves acquisition of existing computer software, the following Company Exhibit is incorporated by reference: CCS Commercial Computer Software License (Company – July 2010).

  • Particular Methods of Procurement of Goods and Works International Competitive Bidding. Goods and works shall be procured under contracts awarded on the basis of International Competitive Bidding.

  • Contract Database Metadata Elements Title: Xxxxxxx-Xxx Xxxxx Central School District and Xxxxxxx-Xxx Xxxxx Teachers Association (2007)

  • Particular Methods of Procurement of Consultants’ Services 1. Quality- and Cost-based Selection. Except as otherwise provided in paragraph 2 below, consultants’ services shall be procured under contracts awarded on the basis of Quality and Cost-based Selection.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!