Technically Feasible refers solely to technical or operational concerns, rather than economic, space, or site considerations.
Interoperability means the ability of a CenturyLink OSS Function to process seamlessly (i.e., without any manual intervention) business transactions with CLEC's OSS application, and vice versa, by means of secure exchange of transaction data models that use data fields and usage rules that can be received and processed by the other Party to achieve the intended OSS Function and related response. (See also Electronic Bonding.)
Software Upgrade means a release of Software, in object code form, or firmware, which adds new functionality and feature enhancements to the Software or Equipment.
functionality means the ability of a tenderer to provide goods or services in accordance with specifications as set out in the tender documents.
Licensed Software includes error corrections, upgrades, enhancements or new releases, and any deliverables due under a maintenance or service contract (e.g., patches, fixes, PTFs, programs, code or data conversion, or custom programming).
Encrypted means the transformation of data into a form which results in a low probability of assigning meaning without the use of a protective process or key.
Standard Software means Software identified as such in Appendix 4 of the Contract Agreement and such other Software as the parties may agree in writing to be Standard Software.
Feedback means input regarding the SAP Products, services, business or technology plans, including, without limitation, comments or suggestions regarding the possible creation, modification, correction, improvement or enhancement of the SAP Products and/or services, or input as to whether Partner believes SAP’s development direction is consistent with their own business and IT needs.
Feasible means capable of being accomplished in a successful manner within a reasonable period of time, taking into account economic, environmental, social, and technological factors.
Hosted Software means the software owned and controlled by Vendor or Vendor’s third-party contractor that supports the Hosted Software Services.
Configuration means State-specific changes made to the Software without Source Code or structural data model changes occurring.
Encrypt means to encode Confidential Information into a format that can only be read by those possessing a “key”; a password, digital certificate or other mechanism available only to authorized users. Encryption must use a key length of at least 128 bits.
System Software means Software that provides the operating and management instructions for the underlying hardware and other components, and is identified as such in Appendix 4 of the Contract Agreement and such other Software as the parties may agree in writing to be Systems Software. Such System Software includes, but is not restricted to, micro-code embedded in hardware (i.e., “firmware”), operating systems, communications, system and network management, and utility software.
Customized Software or “Customization” means any Application Software code modified or amended on behalf of the Customer. Setting of parameters, parameterization or configuration is not a Customization.
Encryption means methods of rendering personally identifiable information unusable, unreadable, or indecipherable to unauthorized persons through the use of a technology or methodology specified or permitted by the Secretary of the United States Department of Health and Human Services in guidance issued under 42 USC Section 17932(h)(2).
Software Update means a package used to upgrade software to a new version including a change of the configuration parameters.
Software means any computer software programs, including all source code, object code, and documentation related thereto and all software modules, tools and databases.
Server Software means software that provides services or functionality on a computer acting as a server.
Malicious Software means any software program or code intended to destroy, interfere with, corrupt, or cause undesired effects on program files, data or other information, executable code or application software macros, whether or not its operation is immediate or delayed, and whether the malicious software is introduced wilfully, negligently or without knowledge of its existence.