Bioinformatics Sample Clauses

Bioinformatics. Except as otherwise set forth in the Transition Plan, CRISPR will be responsible for maintaining [***] and will provide Vertex access as reasonably needed with respect to the Shared Products, including access to validation data and reports. CRISPR will consult with Vertex if any material changes or updates are to be made to [***] and take reasonable steps to provide such changes or updates to Vertex. Additionally, CRISPR will provide reasonable support to Vertex if [***].
AutoNDA by SimpleDocs
Bioinformatics. Bioinformatics is a rapidly growing field, one of whose objectives is to model the natural world. Recent developments suggest a convergence of nanotechnology with the cognitive sciences. This convergence is based on material unity at the nanoscale and the ability to manage information on biological systems at various scales from DNA to society through bioinformatics. Insights from our project relating to the ability to manage information in a large society of artificial systems could contribute to advances in bioinformatics. • Pro-active threshold cryptography. The idea of threshold cryptography is to protect sensitive information by distributing it among a cluster of cooperating computers in a fault-tolerant manner. This information can only be retrieved when a certain threshold is reached by a cluster of machines. The main goals are: improve the security and/or efficiency of cryptographic applications, design new secure cryptographic primitives, formalise and rigorously analyse common cryptographic practices, protect against key exposure, and make distributed/multiparty computations secure. Our dynamic methods of distributing information on a cluster of machines, and our insights into knowledge shared between and amongst agents could contribute to these goals. • Automatic ontology mapping. The vast collections of databases around the globe often have different ways of storing ontologies containing similar data. Communication between these databases is desirable for many reasons and in many places. Our project can provide the insight for developing intermediate languages to communicate between the ontologies of these databases. Companies working in these areas will be targeted for invitation to the project exploitation workshop, and for possible individual technology transfer activities. Further areas for potential exploitation are expected to arise as the project progresses and matures, and as the surrounding state-of-the-art changes. Our exploitation plans will be continuously updated to account for this. On the long term one of the main promises of this project is the ability to tackle problem solving in and generate knowledge about complex environments in a new way. An important category of applications is formed by resource seeking and utilisation, i.e., detecting and collecting some targeted resources, and possibly even processing (manufacturing) them in a prescribed way. Imagine a complex virtual or real environment, such as the Internet or Mars. A...
Bioinformatics. (a) During the Extended License Term, DiaDexus shall promptly and fully disclose to Incyte and SB any DiaDexus IP which is Bioinformatics and subject to the provisions of Paragraph 5.6.3 which is reasonably available and transferable, and shall specify any prior Third Party obligations with respect to DiaDexus IP.
Bioinformatics. As part of The Joint Venture's research and development efforts under the Research Program, The Joint Venture shall develop, acquire and/or integrate the bioinformatics technologies as necessary for the analysis, interpretation and use of the gene expression information generated by The Joint Venture in practicing the MPSS method as permitted hereunder.
Bioinformatics. The GeneSniffer script will continue to be used to rank functional and druggable positional candidate genes. Further development for the script includes: • Inclusion of rank parameter based on proximity to peak of linkage signal • Development of a statistical assessment of the significance of the genes total “hit score” by evaluating scores obtained under the null hypothesis. Summary

Related to Bioinformatics

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Diagnostic procedures to aid the Provider in determining required dental treatment.

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate PNG’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. PNG shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Tools The parties agree that a necessary precondition for a productive an efficient workforce is to ensure that employees maintain and are where possible provided with an adequate kit of tools. In circumstances where the employees are required to supply their own tools and have them stolen, by no fault of their own, shall be compensated to a maximum of $1,000.00.

  • Processes Any employer, employee, trade union or employer’s association may at any point in time apply for an exemption from any of the provisions of this Collective Agreement. The applicant is required to complete and submit in writing with the relevant office of the Council, a fully and properly completed prescribed application for exemption form, accompanied by all relevant supporting documentation.

  • Technology Research Analyst Job# 1810 General Characteristics Maintains a strong understanding of the enterprise’s IT systems and architectures. Assists in the analysis of the requirements for the enterprise and applying emerging technologies to support long-term business objectives. Responsible for researching, collecting, and disseminating information on emerging technologies and key learnings throughout the enterprise. Researches and recommends changes to foundation architecture. Supports research projects to identify and evaluate emerging technologies. Interfaces with users and staff to evaluate possible implementation of the new technology in the enterprise, consistent with the goal of improving existing systems and technologies and in meeting the needs of the business. Analyzes and researches process of deployment and assists in this process.

  • Software Title and ownership to Existing Software Product(s) delivered by Contractor under the Contract that is normally commercially distributed on a license basis by the Contractor or other independent software vendor proprietary owner (“Existing Licensed Product”), embedded in the Custom Products, shall remain with Contractor or the proprietary owner of other independent software vendor(s) (ISV). Effective upon acceptance, such Product shall be licensed to Authorized User in accordance with the Contractor or ISV owner’s standard license agreement, provided, however, that such standard license, must, at a minimum: (a) grant Authorized User a non-exclusive, perpetual license to use, execute, reproduce, display, perform, adapt (unless Contractor advises Authorized User as part of Contractor’s proposal that adaptation will violate existing agreements or statutes and Contractor demonstrates such to the Authorized User’s satisfaction) and distribute Existing Licensed Product to the Authorized User up to the license capacity stated in the Purchase Order or work order with all license rights necessary to fully effect the general business purpose(s) stated in the Bid or Authorized User’s Purchase Order or work order, including the financing assignment rights set forth in paragraph (c) below; and (b) recognize the State of New York as the licensee where the Authorized User is a state agency, department, board, commission, office or institution. Where these rights are not otherwise covered by the ISV’s owner’s standard license agreement, the Contractor shall be responsible for obtaining these rights at its sole cost and expense. The Authorized User shall reproduce all copyright notices and any other legend of ownership on any copies authorized under this clause. Open source software is developed independently of Contractor and may be governed by a separate license (“open source software”). If the open source software is governed by a separate License and provided under this Contract, Contractor shall provide a copy of that license in the applicable Documentation and the Authorized User's license rights and obligations with respect to that open source software shall be defined by those separate license terms and subject to the conditions, if any, therein. Nothing in this Contract shall restrict, limit, or otherwise affect any rights or obligations the Authorized User may have, or conditions to which the Authorized User may be subject, under such separate open source license terms.

  • Software Development Software designs, prototypes, and all documentation for the final designs developed under this agreement must be made fully transferable upon direction of NSF. NSF may make the software design, prototype, and documentation for the final design available to competitors for review during any anticipated re-competition of the project.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Firmware The Contractor shall deliver firmware required for production acceptance testing in accordance with CDRL A009 Contractor’s Supplier Configuration Management Plan. The Contractor shall use Government furnished software for testing. Deliverable Data Item (See DD-1423): CDRL A009: “Contractor’s Supplier Configuration Management Plan”

Time is Money Join Law Insider Premium to draft better contracts faster.