Use of Microsoft Technology in Offerings Sample Clauses

Use of Microsoft Technology in Offerings. To the greatest extent possible (taking into account client needs and preferences and Microsoft's product offerings), all Avanade Service Offerings will be based on and take full advantage of the Microsoft Enterprise Solutions Platform. The Company will often work with third party products as necessary to port, integrate and interface them with Microsoft platforms, products or technology. However, only on a rare exception basis will competing products or technologies be used to deliver client solutions. In the event that the Company personnel offering a Avanade Services Offering for a client in a Go-to-Market Focus Area determine that commercial or technical issues would appear to prevent a solution deployment on the Microsoft Enterprise Solutions Platform, then the following will apply. To the greatest extent acceptable to the client and appropriate in light of the project's timetable and requirements, the Company will provide Microsoft with an opportunity to involve, as appropriate, its Microsoft Consulting Services personnel and relevant Microsoft product groups (at no cost to the Company or its client) for consultation with personnel of the Company to evaluate the potential barriers and how they may be resolved. In the event Microsoft does consult on the matter in a timely fashion, the Company will use commercially reasonable efforts to consider and, to the extent it deems appropriate under the circumstances, implement Microsoft's written response. Microsoft will coordinate its consultation process with the Company's personnel so as not to interfere with or delay the client's project schedules.
AutoNDA by SimpleDocs

Related to Use of Microsoft Technology in Offerings

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as: • UC Electronic Communications Policy: xxxx://xxx.xxxx.xxx/ucophome/policies/ec/ • UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455 • IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html • The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html • Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Licensed Technology (a) LICENSOR is not aware of any interference, infringement, misappropriation, or other conflict with any intellectual property rights of third parties, and LICENSOR has never received any charge, complaint, claim, demand, or notice alleging any such interference, infringement, misappropriation, or violation (including any claim that LICENSOR must license or refrain from using any intellectual property rights of any third party). To the knowledge of LICENSOR, no third party has interfered with, infringed upon, misappropriated, or otherwise come into conflict with any of the LICENSED TECHNOLOGY. (b) Exhibit A identifies each patent or registration which has been issued to LICENSOR with respect to any of the LICENSED TECHNOLOGY and identifies each pending patent application or application for registration which LICENSOR has made with respect to any of the LICENSED TECHNOLOGY. LICENSEE acknowledges that LICENSOR has previously made available to LICENSEE correct and complete copies of all such patents, registrations and applications (as amended to-date) in LICENSOR’s possession and has made available to LICENSEE correct and complete copies of all other written documentation in LICENSOR’s possession evidencing ownership and prosecution (if applicable) of each such item. (c) Exhibit A identifies each item of LICENSED TECHNOLOGY that is assigned to LICENSOR or that LICENSOR uses pursuant to license, sublicense, agreement, or permission. LICENSOR has made available to LICENSEE correct and complete copies of all such licenses, sublicenses, agreements, patent prosecution files and permissions (as amended to-date) in LICENSOR’s possession. With respect to each item of LICENSED TECHNOLOGY required to be identified in Exhibit A and to the knowledge of LICENSOR: (i) the license, sublicense, agreement, or permission covering the item is legal, valid, binding, enforceable, and in full force and effect; (ii) the license, sublicense, agreement, or permission will continue to be legal, valid, binding, enforceable, and in full force and effect on identical terms following the consummation of the transactions contemplated hereby; (iii) no Party to the license, sublicense, agreement, or permission is in breach or default, and no event has occurred which with notice or lapse of time would constitute a breach or default or permit termination, modification, or acceleration thereunder; (iv) no party to the license, sublicense, agreement, or permission has repudiated any provision thereof; (v) the underlying item of LICENSED TECHNOLOGY is not subject to any outstanding lien or encumbrance, injunction, judgment, order, decree, ruling, or charge; (vi) no action, suit, proceeding, hearing, investigation, charge, complaint, claim, or demand is pending or is threatened which challenges the legality, validity, or enforceability of the underlying item of LICENSED TECHNOLOGY; and (vii) except as provided in Exhibit A, LICENSOR has not granted any license or similar right to the LICENSED TECHNOLOGY within the GENERAL FIELD or PARTHENOGENESIS FIELD.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Joint Technology The Parties agree that, in order to effectuate the provisions of Section 4.4.2, subject to any exclusive licenses granted hereunder, (a) the non-use provisions of this Article 9 shall not apply to each Party’s use of Joint Technology, and (b) each Party may disclose the Joint Technology to Third Parties who are under terms of confidentiality no less strict than those contained in this Agreement.

  • Software Development Software designs, prototypes, and all documentation for the final designs developed under this agreement must be made fully transferable upon direction of NSF. NSF may make the software design, prototype, and documentation for the final design available to competitors for review during any anticipated re-competition of the project.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Use of Materials There should be no limitations or restrictions by Union upon a Contractor's choice of materials or design, nor, regardless of source or location, upon the full use and utilization, of equipment, machinery, packaging, precast, prefabricated, prefinished, or preassembled materials, tools or other labor saving devices, subject to the application of the California Public Contract and Labor Codes. Generally, the onsite installation or application of such items shall be performed by the craft having jurisdiction over such work.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • Marketing Materials (a) During the term of this Agreement, the Sub-Adviser agrees to furnish the Manager at its principal office for prior review and approval by the Manager all written and/or printed materials, including but not limited to, PowerPointÒ or slide presentations, news releases, advertisements, brochures, fact sheets and other promotional, informational or marketing materials (the “Marketing Materials”) for internal use or public dissemination, that are produced or are for use or reference by the Sub-Adviser, its affiliates or other designees, broker-dealers or the public in connection with the Series, and Sub-Adviser shall not use any such materials if the Manager reasonably objects in writing within five business days (or such other period as may be mutually agreed) after receipt thereof. Marketing Materials may be furnished to the Manager by first class or overnight mail, facsimile transmission equipment, electronic delivery or hand delivery. (b) During the term of this Agreement, the Manager agrees to furnish the Sub-Adviser at its principal office all prospectuses, proxy statements, reports to shareholders, or Marketing Materials prepared for distribution to shareholders of each Series, or the public that refer to the Sub-Adviser in any way, prior to the use thereof, and the Manager shall not use any such materials if the Sub-Adviser reasonably objects in writing within five business days (or such other period as may be mutually agreed) after receipt thereof. The Sub-Adviser’s right to object to such materials is limited to the portions of such materials that expressly relate to the Sub-Adviser, its services and its clients. The Manager agrees to use its reasonable best efforts to ensure that materials prepared by its employees or agents or its affiliates that refer to the Sub-Adviser or its clients in any way are consistent with those materials previously approved by the Sub-Adviser as referenced in the first sentence of this paragraph. Marketing Materials may be furnished to the Sub-Adviser by first class or overnight mail, facsimile transmission equipment, electronic delivery or hand delivery.

Draft better contracts in just 5 minutes Get the weekly Law Insider newsletter packed with expert videos, webinars, ebooks, and more!