The Challenge of Technology Lock Sample Clauses

The Challenge of Technology Lock in It has been very important for EUDAT to provide services at an early stage of the project. However, as EUDAT is recognized as a high-profile initiative, the technology choices made by EUDAT influence the potential user base, sustainability, and training for other communities (and may even have an unexpected impact on their decisions). At the first annual review of the project, it was recommended that EUDAT should focus more on offering primitives and generic services and that the project should consider using non-proprietary solutions that have a good sustainability perspective. From the beginning stages of writing the EUDAT proposal, it has been clear that EUDAT was not aiming to develop new technologies. EUDAT services are built on top of existing technologies and adapted to specific needs. During the process of scouting and evaluating technologies to implement the EUDAT services, technologies are selected based on functional requirements (e.g. stakeholder requirements), non-functional requirements (e.g. scalability, reliability, and so forth), interoperability between existing e-infrastructures, and compliance to international standards. The mere selection of a specific technology inevitably creates a level of lock-in. This is independent of aspects such as whether the technology is proprietary or non-proprietary, closed or open source, or developed externally or internally. This is due to specific technology requirements, internal organisation and configurations. It is important that the choices made by EUDAT do not require high investments in infrastructure or license fees, and that they do not cause limitations in terms of the human resources needed to adapt to or operate the services. Assuming that functional and non-functional requirements are met, open source technologies are prime candidates because they eliminate the expense of license fees and make it possible to adapt technologies to specific needs. The current technologies used by EUDAT are all open source technologies (Annex B, page 45). To limit the dependency of users on specific tools, standards and technologies, it is important to choose technologies which provide widely-used application programming interfaces (APIs). However, such APIs should address the user requirements and must not limit interoperability between existing e- infrastructures. In many of the initial EUDAT use cases (such as EPOS and VPH  see chapter 3, page 30, for more information), communities wanted to process da...
AutoNDA by SimpleDocs

Related to The Challenge of Technology Lock

  • License of Intellectual Property Each Party (a “Licensor”) grants the other Party (a “Licensee”) the non-exclusive, royalty-free, paid-up, worldwide, irrevocable, right, during the term of this Agreement, to use the Licensor’s Intellectual Property solely for the purposes of this Agreement and to carry out the Party’s functions consistent with its responsibilities and authority as set forth in the enable legislation and regulations. Such licenses shall not give the Licensee any ownership interest in or rights to the Intellectual Property of the Licensor. Each Licensee agrees to abide by all third-party license and confidentiality restrictions or obligations applicable to the Licensor’s Intellectual Property of which the Licensor has notified the Licensee in writing.

  • Patent Rights The State and the U. S. Department of Transportation shall have the royalty free, nonexclusive and irrevocable right to use and to authorize others to use any patents developed by the Engineer under this contract.

  • INTELLECTUAL PROPERTY RIGHTS - INVENTION AND PATENT RIGHTS Unless otherwise agreed upon by NASA and AFRL, custody and administration of inventions made (conceived or first actually reduced to practice) under this IAA will remain with the respective inventing Party. In the event an invention is made jointly by employees of the Parties (including by employees of a Party's contractors or subcontractors for which the U.S. Government has ownership), the Parties will consult and agree as to future actions toward establishment of patent protection for the invention.

  • Research, Science and Technology Cooperation 1. The aims of cooperation in research, science and technology, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to build on existing agreements already in place for cooperation on research, science and technology; (b) to encourage, where appropriate, government agencies, research institutions, universities, private companies and other research organizations in the Parties to conclude direct arrangements in support of cooperative activities, programs or projects within the framework of this Agreement, specially related to trade and commerce; and (c) to focus cooperative activities towards sectors where mutual and complementary interests exist, with special emphasis on information and communication technologies and software development to facilitate trade between the Parties. 2. The Parties will encourage and facilitate, as appropriate, the following activities including, but not limited to:

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Collaboration We believe joint effort toward common goals achieves trust and produces greater impact for L.A. County’s youngest children and their families.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Use of Intellectual Property The Adviser grants to the Sub-Adviser a sublicense to use the trademarks, service marks, logos, names, or any other proprietary designations of the Adviser (“AdvisorShares Marks”) on a non-exclusive basis. The Sub-Adviser will acquire no rights in the AdvisorShares Marks, and all goodwill of the AdvisorShares Marks shall inure to and remain with the Adviser. The Sub-Adviser agrees that neither it, nor any of its affiliates, will knowingly in any way refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates or use AdvisorShares Marks in offering, marketing or other promotional materials without the prior express written consent of the Adviser, which approval will not be unreasonably withheld or delayed, except as required by rule, regulation or upon the request of a governmental authority. Notwithstanding the forgoing, the Sub-Adviser and its affiliates may, without obtaining the Adviser’s prior approval, refer directly or indirectly to its relationship with the Trust, the Fund(s), the Adviser or any of their respective affiliates and use AdvisorShares Marks in offering, marketing or other promotional materials provided that such materials were previously approved by the Adviser and remain in substantially the same form.

  • Patent/Copyright Materials/Proprietary Infringement Unless otherwise expressly provided in this Contract, Contractor shall be solely responsible for clearing the right to use any patented or copyrighted materials in the performance of this Contract. Contractor warrants that any software as modified through services provided hereunder will not infringe upon or violate any patent, proprietary right or trade secret right of any third party. Contractor agrees that, in accordance with the more specific requirement contained in paragraph 18 below, it shall indemnify, defend and hold County and County Indemnitees harmless from any and all such claims and be responsible for payment of all costs, damages, penalties and expenses related to or arising from such claim(s), including, but not limited to, attorney’s fees, costs and expenses.

  • Notice of Technological Change (a) For the purpose of technological change, the Employer agrees to provide the Union with as much notice as possible, but in any event not less than sixty (60) days notice of a technological change.

Time is Money Join Law Insider Premium to draft better contracts faster.