Empirical domain Sample Clauses

Empirical domain. The context of the empirical study will be a set of manufacturing firms facing a digital transformation within their internal core processes: digitalization of physical assets thanks to the introduction of digital technologies (e.g., auto-identification sensors within a production line thus transforming/reshaping how workers interact with the environment). This will affect their traditional activities that will, now, require a more managerial approach and not technical only. The reshape of work activities is considered fundamental and around this topic will be centred the data collection phase.
AutoNDA by SimpleDocs
Empirical domain. The three above-mentioned research views are the ones that we will apply to the exploration and understanding of the DiDIY phenomenon, reading it through the multifaceted lenses of cluster theory. The ‘digital’ evolution of the DIY culture or – more broadly – the ‘makers movement’ can be considered ‘popular culture’ for its wide accessibility and geographically spread diffusion. The maker movement is a cultural trend that places value on an individual’s ability to be a creator of things as well as a consumer of things. The maker movement is spreading worldwide and its growth rate is impressive. Moreover, the digital DIY phenomenon has induced a democratization of entrepreneurship together with the emergence of an innovative entrepreneurial ecosystem supporting it (e.g., fablabs, makerspaces, techshops, crowdfunding, etc) which fosters innovation networks both in virtual communities and in physical geographical proximity.

Related to Empirical domain

  • Third Party Technology Customer is hereby notified that third parties have licensed certain technology to Company, which is contained in the Software. Notwithstanding anything herein to the contrary, Customer hereby consents to the disclosure of Customer’s identity, and such other terms of this Agreement as necessary, to such third party licensors for the purpose of enabling Company to comply with the terms and conditions of such third party licenses. Any such Customer information will be provided pursuant to an obligation of confidentiality and nondisclosure at least as stringent as that imposed by this Agreement.

  • Licensee Licensee represents and warrants that:

  • Licensed Technology The term “Licensed Technology” shall mean the Licensed Patent Rights, Licensed Know-How and Licensed Biological Materials.

  • Licensor any Person from whom a Grantor obtains the right to use any Intellectual Property. Lien: any Person’s interest in Property securing an obligation owed to, or a claim by, such Person, whether such interest is based on common law, statute or contract, including liens, security interests, pledges, hypothecations, statutory trusts, reservations, exceptions, encroachments, easements, rights-of-way, covenants, conditions, restrictions, leases, and other title exceptions and encumbrances affecting Property. Lien Waiver: an agreement, in form and substance satisfactory to Collateral Agent, by which (a) for any material Collateral located on leased premises, the lessor waives or subordinates any Lien it may have on the Collateral, and agrees to permit Collateral Agent to enter upon the premises and remove the Collateral or to use the premises to store or dispose of the Collateral; (b) for any Collateral held by a warehouseman, processor, shipper, customs broker or freight forwarder, such Person waives or subordinates any Lien it may have on the Collateral, agrees to hold any Documents in its possession relating to the Collateral as agent for Collateral Agent, and agrees to deliver the Collateral to Collateral Agent upon request; (c) for any Collateral held by a repairman, mechanic or bailee, such Person acknowledges Collateral Agent’s Lien, waives or subordinates any Lien it may have on the Collateral, and agrees to deliver the Collateral to Collateral Agent upon request; and (d) for any Collateral subject to a Licensor’s Intellectual Property rights, the Licensor grants to Collateral Agent the right, vis-à-vis such Licensor, to enforce Collateral Agent’s Liens with respect to the Collateral, including the right to dispose of it with the benefit of the Intellectual Property, whether or not a default exists under any applicable License.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Technical Information The Employer agrees to provide to the Union such information that is available relating to employees in the bargaining unit, as may be required by the Union for collective bargaining purposes.

  • Background Technology List here prior contracts to assign Inventions that are now in existence between any other person or entity and you. [ ] List here previous Inventions which you desire to have specifically excluded from the operation of this Agreement. Continue on reverse side if necessary.

  • Use of Technology Participants are subject to all existing laws (federal and state) and University regulations and policies on use of technology, including not only those laws and regulations that are specific to computers and networks, but also those that may apply generally to personal conduct such as:  UC Electronic Communications Policy: xxxx://xxxxxx.xxxx.xxx/doc/7000470/ElectronicCommunications  UCLA E-mail Policy and Guidelines: xxxx://xxx.xxxxxxxxxxxxx.xxxx.xxx/app/Default.aspx?&id=455  IT Services Acceptable Use Policy: xxxx://xxx.xxx.xxxx.xxx/policies/aupdetail.html  The UC Policy on Copyright Ownership: xxxx://xxxxxxxxx.xxxxxxxxxxxxxxxxxxxxxx.xxx/resources/copyright-ownership.html  Bruin OnLine Service Level Agreement: xxxx://xxx.xxx.xxxx.xxx/policies/BOL_SLA.pdf Any violation may result in technology related privileges being restricted or revoked and may also result in The University undertaking disciplinary or civil action. If the violation constitutes a criminal offense, appropriate legal action may be taken.

  • Security Technology When the service is accessed using a supported web browser, Secure Socket Layer (“SSL”), or equivalent technology shall be employed to protect data from unauthorized access. The service security measures shall include server authentication and data encryption. Provider shall host data pursuant to the DPA in an environment using a firewall that is periodically updated according to industry standards.

Time is Money Join Law Insider Premium to draft better contracts faster.