Archival Research Sample Clauses

Archival Research. For each undertaking the City will consult the DHR VCRIS database and prepare a map showing all properties contained in VCRIS that are within or adjacent to the APE. Where applicable the file will contain copies of the survey files for previously documented properties found VCRIS.
AutoNDA by SimpleDocs
Archival Research. Archival or background research is generally undertaken prior to any field survey. Where identification is undertaken as part of a comprehensive planning process, background research may have taken place as part of the development of the historic contexts (see the Guidelines for Preservation Planning). In the absence of previously developed historic contexts, archival research should address specific issues and topics. It should not duplicate previous work. Sources should include, but not be limited to, historical maps, atlases, tax records, photographs, ethnographies, folklife documentation, oral histories and other studies, as well as standard historical reference works, as appropriate for the research problem. (See the Guidelines for Historical Documentation for additional discussion.)
Archival Research. This task includes identification and analysis of literature, documents, technical studies, photographs, and other records found in libraries, government agencies, private firms, and archives that are pertinent to the management of cultural resources in a specified project area. The task includes an analysis of the documentation and the preparation of a report in accordance with Attachment J-3 General Report Specifications of Section J, which incorporates the data gathered.
Archival Research. Archival research would help establish a basic direction for the field survey by providing the information required to place historic resources in their appropriate historical and cultural contexts, which in turn will ensure that all of the surveyed resources are properly understood and evaluated in terms of their potential architectural and historical significance to The County. In developing these historic contexts, EPEI would consult archival sources including, but not limited to: ● Previous survey and planning efforts: EPEI would first assemble existing information regarding any historic resource surveys, National Register nominations, design guidelines, preservation plans, downtown and comprehensive master plans, and other studies, previously prepared for The County. These studies would be reviewed and assessed for relevant architectural, historical, and planning data, possible information gaps, and community development patterns, that would provide a broader understanding of significant contexts and values that might be embedded in historic properties identified during the field survey. ● Property records: Tax/appraisal records for each parcel within the survey area would be consulted to assist in determining construction dates and property boundaries for individual properties and any ancillary structures, alterations, and/or additions associated with these properties. The results of this data collection would be cross- checked for accuracy during the field survey. ● Historic mapping/imagery: Various forms of graphic material such as architectural drawings, plat maps, photographs, Xxxxxxx maps, and bird’s-eye views would be reviewed to analyze street layouts, property floor plans, and general development patterns within the period of significance established for the survey. ● Local historical accounts: Primary and secondary source material on the broader developmental history of the survey area, as well as historical information on select properties within the survey area, would be consulted as needed to supplement the architectural and historical data collected from the sources referenced above.
Archival Research. The locations of materials related to the history of the IHVM were identified through publications, interviews with knowledgeable experts, and telephone calls.111 Several source locations were identified and subsequently visited that held original documents and records associated with the IHVM and its activities. These locations were the Xxxxxx X. Xxxxxxx Xx. History of Medicine Collection at the Xxxxx Medical Library of the University of Texas Medical Branch, the Presbyterian Historical Society, and the Bioethics Research Library at Georgetown University. Additionally, several other schools associated with leaders of the Institute during the period of the IHVM’s work were visited: Center for Medical Humanities, Compassionate Care, and Bioethics, State University of New York, Stony Brook, Department of Humanities & Xxxxxx Center for Humanistic Medicine, Penn State University, the Department of History and Philosophy of Medicine, University of Kansas Medical Center, and the Institute for Medical Humanities, University of Texas Medical Branch. These visits included review of available materials mainly derived from meetings and interviews with knowledgeable faculty and staff at these 111 The search for the main collection of SHHV and IHVM files began with an initial interview with Xxxxxx XxXxxxxxxx, Ph.D., the Director of Programs for the IHVM, on July 19, 2014. He provided direction that materials may still be held at the Presbyterian Historical Society as indicated in his 2001 publication with Xxxxxx Xxxxxxxxxx. (XxXxxxxxxx 2001) This publication provided a list of the eighteen published reports of the IHVM held at the Presbyterian Historical Society (PHS). A telephone call to the PHS archives provided information that the majority of files had been moved to the University of Texas Medical Branch in Galveston, Texas, the last home of the SHHV. Four boxes remained at the PHS, two open and two sealed. Access to the sealed boxes was given by the PHS administration in 2016 for use in this dissertation study. locations. These visits will be further described in the Interviews section of this “Methods” chapter. The archives of the Association of American Medical Colleges (AAMC) and the National Endowment for the Humanities (NEH) were also accessed. The archivists at the AAMC provided valuable information. The contact at the NEH was not able to provide assistance or information.
Archival Research. Archival research involve the analysis of data from existing data archives, such as the review of literature, articles and previous studies, surveys and public records. These sources were my first primary analyses. They are also baseline and primary data for my research using other methods, as in combined methods research.

Related to Archival Research

  • Technology Research Analyst Job# 1810 General Characteristics Maintains a strong understanding of the enterprise’s IT systems and architectures. Assists in the analysis of the requirements for the enterprise and applying emerging technologies to support long-term business objectives. Responsible for researching, collecting, and disseminating information on emerging technologies and key learnings throughout the enterprise. Researches and recommends changes to foundation architecture. Supports research projects to identify and evaluate emerging technologies. Interfaces with users and staff to evaluate possible implementation of the new technology in the enterprise, consistent with the goal of improving existing systems and technologies and in meeting the needs of the business. Analyzes and researches process of deployment and assists in this process.

  • Research Support opioid abatement research that may include, but is not limited to, the following:

  • Research Analyst Independence The Company acknowledges that the Underwriters’ research analysts and research departments are required to be independent from their respective investment banking divisions and are subject to certain regulations and internal policies, and that such Underwriters’ research analysts may hold views and make statements or investment recommendations and/or publish research reports with respect to the Company and/or the offering that differ from the views of their respective investment banking divisions. The Company hereby waives and releases, to the fullest extent permitted by law, any claims that the Company may have against the Underwriters with respect to any conflict of interest that may arise from the fact that the views expressed by their independent research analysts and research departments may be different from or inconsistent with the views or advice communicated to the Company by such Underwriters’ investment banking divisions. The Company acknowledges that each of the Underwriters is a full service securities firm and as such from time to time, subject to applicable securities laws, may effect transactions for its own account or the account of its customers and hold long or short positions in debt or equity securities of the companies that may be the subject of the transactions contemplated by this Agreement.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Research Use Reporting To assure adherence to NIH GDS Policy, the PI agrees to provide annual Progress Updates as part of the annual Project Renewal or Project Close-out processes, prior to the expiration of the one (1) year data access period. The PI who is seeking Renewal or Close-out of a project agree to complete the appropriate online forms and provide specific information such as how the data have been used, including publications or presentations that resulted from the use of the requested dataset(s), a summary of any plans for future research use (if the PI is seeking renewal), any violations of the terms of access described within this Agreement and the implemented remediation, and information on any downstream intellectual property generated from the data. The PI also may include general comments regarding suggestions for improving the data access process in general. Information provided in the progress updates helps NIH evaluate program activities and may be considered by the NIH GDS governance committees as part of NIH’s effort to provide ongoing stewardship of data sharing activities subject to the NIH GDS Policy.

  • RESEARCH AND PUBLICATION 34 CONTRACTOR shall not utilize information and/or data received from COUNTY, or arising out 35 of, or developed, as a result of this Agreement for the purpose of personal or professional research, or 36 for publication. 37 //

  • Public Posting of Approved Users’ Research Use Statement The PI agrees that information about themselves and the approved research use will be posted publicly on the dbGaP website. The information includes the PI’s name and Requester, project name, Research Use Statement, and a Non-Technical Summary of the Research Use Statement. In addition, and if applicable, this information may include the Cloud Computing Use Statement and name of the CSP or PCS. Citations of publications resulting from the use of controlled-access datasets obtained through this DAR may also be posted on the dbGaP website.

  • Insurance and Fingerprint Requirements Information Insurance If applicable and your staff will be on TIPS member premises for delivery, training or installation etc. and/or with an automobile, you must carry automobile insurance as required by law. You may be asked to provide proof of insurance. Fingerprint It is possible that a vendor may be subject to Chapter 22 of the Texas Education Code. The Texas Education Code, Chapter 22, Section 22.0834. Statutory language may be found at: xxxx://xxx.xxxxxxxx.xxxxx.xxxxx.xx.xx/ If the vendor has staff that meet both of these criterion: (1) will have continuing duties related to the contracted services; and (2) has or will have direct contact with students Then you have ”covered” employees for purposes of completing the attached form. TIPS recommends all vendors consult their legal counsel for guidance in compliance with this law. If you have questions on how to comply, see below. If you have questions on compliance with this code section, contact the Texas Department of Public Safety Non-Criminal Justice Unit, Access and Dissemination Bureau, FAST-FACT at XXXX@xxxxx.xxxxx.xx.xx and you should send an email identifying you as a contractor to a Texas Independent School District or ESC Region 8 and TIPS. Texas DPS phone number is (000) 000-0000. See form in the next attribute to complete entitled: Texas Education Code Chapter 22 Contractor Certification for Contractor Employees

  • Research Independence The Company acknowledges that each Underwriter’s research analysts and research departments, if any, are required to be independent from their respective investment banking divisions and are subject to certain regulations and internal policies, and that such Underwriter’s research analysts may hold and make statements or investment recommendations and/or publish research reports with respect to the Company and/or the offering that differ from the views of its investment bankers. The Company hereby waives and releases, to the fullest extent permitted by law, any claims that the Company may have against such Underwriter with respect to any conflict of interest that may arise from the fact that the views expressed by their independent research analysts and research departments may be different from or inconsistent with the views or advice communicated to the Company by such Underwriter’s investment banking divisions. The Company acknowledges that the Representative is a full service securities firm and as such from time to time, subject to applicable securities laws, may effect transactions for its own account or the account of its customers and hold long or short position in debt or equity securities of the Company.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

Time is Money Join Law Insider Premium to draft better contracts faster.