Virtualisation Sample Clauses

Virtualisation. Pour chaque copie du logiciel Apple faisant l’objet d’une location conformément aux dispositions de la présente Section 3, un Bailleur ou un Locataire (mais pas les deux) est autorisé à installer, utiliser et exécuter des copies ou des instances supplémentaires du logiciel Apple dans des environnements de système d’exploitation virtuels conformément à la Section 2B(iii), à condition que le Bailleur ne puisse virtualiser qu’une seule instance ou copie du logiciel Apple comme outil dans le but de fournir à un Locataire l’accès au logiciel Apple et la possibilité d’utiliser ce dernier en vertu de la présente Section 3.
AutoNDA by SimpleDocs
Virtualisation. NSMS can provide virtualisation software that allows "guest" operating systems such as Windows or Linux to run on MMP machines, subject to the following conditions: Purchase of the appropriate guest operating system licence is the responsibility of the client. Management of a virtual machine is entirely the responsibility of the client; guest operating systems are not covered under the terms of the MMP.
Virtualisation. All production servers are deployed using virtualization. This platform is built with high availability allowing for automated system recovery for Host specific disasters. In the event of a major full site disaster, MRG’s highly portable virtual infrastructure lends itself to quick off-site recovery in our vendor’s data center.
Virtualisation. The virtualisation component facilitates access to heterogeneous data sources and infrastructure concealing the technical facets of data streams such as location, storage structure, access format, and streaming technology. The system designates various wrappers to encompass a large number of input formats, while it provides a unified format as output (i.e. RDF or Turtle), which is defined in the system. In the context of smart cities and real-time information processing, the IoT streams represent the city sensors and actuators as well as data repositories, which collect the information relevant to the operation of the city. The IoT stream virtualisation allows modelling of the resources (e.g. sensors, actuators, data repositories, citizens) in a manner, which enables a device, such as a parking application, to access these resources systematically in interoperable way. The citizen communication devices (e.g. smart phones) can be also used as virtual sensors.
Virtualisation. Data wrappers are responsible from the interaction with particular type of external data, for example one may solely obtain data about traffic sensors, another one may retrieve data regarding the weather conditions in a city, and another one that obtains data from social media. This Section presents the data wrappers we use within the CityPulse project. In Section 3.2, we will present the data wrappers that are used to obtain real world data streams from IoT, social media and city information sources in order to create their virtual representation. In Section 3.3, we describe the resource management component that is used as an interface to add description and ID regarding the corresponding data source. In Section 3.4, we describe the quality assessment process that is utilised in the framework.
Virtualisation. 2.27.1. Virtual instances must be subject to approval, deployed on robust, secure physical hardware and configured to segregate sensitive information to prevent business disruption as a result of system overload or disclosure of sensitive information to unauthorised individuals.
Virtualisation. Pour chaque copie du Logiciel Apple faisant l’objet d’une location conformément aux dispositions de la présente Section 3, une Personne donnant à bail ou un Locataire (mais pas les deux) est autorisé à installer, utiliser et exécuter des copies ou des instances supplémentaires du Logiciel Apple dans des environnements de système d’exploitation virtuels conformément à la
AutoNDA by SimpleDocs

Related to Virtualisation

  • Registry Interoperability and Continuity Registry Operator shall comply with the Registry Interoperability and Continuity Specifications as set forth in Specification 6 attached hereto (“Specification 6”).

  • Technical and Organisational Measures (1) Before the commencement of processing, the Supplier shall document the execution of the necessary Technical and Organisational Measures, set out in advance of the awarding of the Order or Contract, specifically with regard to the detailed execution of the contract, and shall present these documented measures to the Client for inspection. Upon acceptance by the Client, the documented measures become the foundation of the contract. Insofar as the inspection/audit by the Client shows the need for amendments, such amendments shall be implemented by mutual agreement.

  • Interoperability To the extent required by applicable law, Cisco shall provide You with the interface information needed to achieve interoperability between the Software and another independently created program. Cisco will provide this interface information at Your written request after you pay Cisco’s licensing fees (if any). You will keep this information in strict confidence and strictly follow any applicable terms and conditions upon which Cisco makes such information available.

  • Staging In addition to the staging categories listed in paragraph 1 of Annex 2-A, this Schedule contains staging categories 20-A, 20-B, PR-1 and PR-130:

  • Streaming The Licensee is entitled to an unlimited amount audio streams (on all streaming platforms such as Spotify) and unlimited video streams (on all platforms supporting video such as Youtube) for the song(s) created with the composition. All streaming royalties generated by the Licensee's song(s) belong to the Licensee.

  • Vulnerability Management BNY Mellon will maintain a documented process to identify and remediate security vulnerabilities affecting its systems used to provide the services. BNY Mellon will classify security vulnerabilities using industry recognized standards and conduct continuous monitoring and testing of its networks, hardware and software including regular penetration testing and ethical hack assessments. BNY Mellon will remediate identified security vulnerabilities in accordance with its process.

  • Maintenance Programme 17.4.1 On or before COD and no later than 45 (forty five) days prior to the beginning of each Accounting Year during the Operation Period, as the case may be, the Concessionaire shall provide to the Authority and the Independent Engineer, its proposed annual programme of preventive, urgent and other scheduled maintenance (the “Maintenance Programme”) to comply with the Maintenance Requirements, Maintenance Manual and Safety Requirements. Such Maintenance Programme shall include:

  • Telework Members are eligible for teleworking during the professional work days designated for grading and reporting at the end of the first, second and third grading periods, and on the day of the Maryland State Education Association Convention if that day is a duty day for teachers.

  • Compatibility 1. Any unresolved issue arising from a mutual agreement procedure case otherwise within the scope of the arbitration process provided for in this Article and Articles 25A to 25G shall not be submitted to arbitration if the issue falls within the scope of a case with respect to which an arbitration panel or similar body has previously been set up in accordance with a bilateral or multilateral convention that provides for mandatory binding arbitration of unresolved issues arising from a mutual agreement procedure case.

  • Security Management The Contractor shall comply with the requirements of the DOD 5200.1-M and the DD Form 254. Security of the Contractor’s electronic media shall be in accordance with the above documents. Effective Program Security shall require the Contractor to address Information Security and Operations Security enabled by the Security Classification Guides. The Contractor’s facility must be able to handle and store material up to the Classification Level as referenced in Attachment J-01, DD Form 254.

Time is Money Join Law Insider Premium to draft better contracts faster.