Technology Stack Sample Clauses

Technology Stack. The solution consists of a web application developed in XXX.XXX Core 2.1, hosted on IIS (version 10) in a Windows Server 2016 Virtual Machine (VM). SSL certificate is installed on IIS.  The database is hosted on SQL Server 2016 and resides in a second Windows Server 2016 VM. Data access is performed with the use of Entity Framework Core Object-Relational Mapper (ORM).  As a development tool, Microsoft Visual Studio Enterprise 2017 Integrated Development Environment (IDE) was used.  The web based user interface (UI) is developed with HTML5, CSS and JavaScript/jQuery.  Data grid functionality is achieved with the help of the third party DevExpress web development framework.  For the System Architecture Diagrams visualization, the Cytoscape.js open-source JavaScript library is used.  The application utilizes Windows Authentication to grant access to users. Note that the above information is indicative and may change as the tools is still under continuous development.  ECHA (mainly personnel of Information Systems Directorate)
AutoNDA by SimpleDocs
Technology Stack. In order to keep the architecture coherent and manageable, and simplify hosting and maintenance, a controlled set of technologies will be used to implement the shared components of the platform. As a general principle, open source technologies will be used to implement the platform (“open source” defined as software licensed under an OSI1-approved license that is included in the list of 1 Open Source Initiative, see xxxx://xxxxxxxxxx.xxx/. EUPL-compatible licenses2). Exceptions will be proprietary or non EUPL-compatible licenses for software belonging to a partner in the colMOOC consortium, or specific products, where no EUPL-compatible alternatives exist.
Technology Stack. Technology Stack selection is the key to the successful development and execution of any software platform or product. Which Blockchain architecture(s), platform(s), and other existing technologies and partners should be used? Blockchain and DLT Technologies integrated with machine learning, encryption, cloud storage, and other technologies are clearly part of the future. Given that the BlakFX project will need to address the scalability trilemma, DLT architecture, compliance issues, on and off-chain storage, BCII would provide a deep dive review to make sure scalability and architecture is sound and thorough. BCII can provide access and introductions to: ● Existing Blockchain technology companies that have already developed technology that could be applicable to the development of Sovereignty’s product line. ● Potential ICO’s that would use the BlakEco and Blak247 coins for their projects ● Investors, syndicates, and funds across the globe.

Related to Technology Stack

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Technology Upgrades Subject to the notice requirements of Section 28 and notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate D&E’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon’s ability to modify its network through the incorporation of new equipment or software or otherwise. D&E shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Technology Access Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of: • providing equivalent access for effective use by both visual and non-visual means; • presenting information, including prompts used for interactive communications, in formats intended for non-visual use; and • being integrated into networks for obtaining, retrieving, and disseminating information used by individuals who are not blind or visually impaired. For purposes of this Section, the phrase “equivalent access” means a substantially similar ability to communicate with or make use of the technology, either directly by features incorporated within the technology or by other reasonable means such as assistive devices or services which would constitute reasonable accommodations under the Americans With Disabilities Act or similar state or federal laws. Examples of methods by which equivalent access may be provided include, but are not limited to, keyboard alternatives to mouse commands and other means of navigating graphical displays, and customizable display appearance. In accordance with Section 2157.005 of the Texas Government Code, the Technology Access Clause contract provision remains in effect for any contract entered into before September 1, 2006.

  • Technology Research Analyst Job# 1810 General Characteristics

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes. 11.2 We may (i) compile statistical and other information related to the performance, operation and use of the Services, and (ii) use data from the Services in aggregated form for security and operations management, to create statistical analyses, and for research and development purposes (clauses i and ii are collectively referred to as “Service Analyses”). We may make Service Analyses publicly available; however, Service Analyses will not incorporate Your Content, Personal Data or Confidential Information in a form that could serve to identify You or any individual. We retain all intellectual property rights in Service Analyses. 11.3 We may provide You with the ability to obtain certain Oracle Software (as defined below) for use with the Services. If we provide Oracle Software to You and do not specify separate terms for such software, then such Oracle Software is provided as part of the Services and You have the non-exclusive, worldwide, limited right to use such Oracle Software, subject to the terms of this Agreement and Your order (except for separately licensed elements of the Oracle Software, which separately licensed elements are governed by the applicable separate terms), solely to facilitate Your use of the Services. You may allow Your Users to use the Oracle Software for this purpose, and You are responsible for their compliance with the license terms. Your right to use any Oracle Software will terminate upon the earlier of our notice (by web posting or otherwise) or the end of the Services associated with the Oracle Software. Notwithstanding the foregoing, if Oracle Software is licensed to You under separate terms, then Your use of such software is governed by the separate terms. Your right to use any part of the Oracle Software that is licensed under the separate terms is not restricted in any way by this Agreement.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!