Environment and Software Sample Clauses

Environment and Software. The Host Software operates on servers located at the facilities of TWTI or its contractor (except to the extent set forth in Article 4), the Applet operates on the Authorized User's local computer, and the Servlet operates on a server located at the facility of ACLA, its hosting contractor, an Enabled Customer, or a Manufacturing Distributor, provided that no more than a total aggregate amount of twenty five (25) Servlets will be installed on servers of Enabled Customers and Manufacturing Distributors. Access to and use of the Host Software, Applet and Servlet is limited to access and use in accordance with Articles 2 and 3 of this Agreement, except for backup rights of ACLA to the extent expressly set forth in Article 4 of this Agreement. The Applet may be accessed only at the web address specified by TWTI using a valid Username and Password; it being acknowledged and agreed that ACLA may include a link to such web address on ACLA's web site. TWTI may change the web addresses from time to time by providing ten (10) days advance written notice of the change to ACLA. Although the Applet can be operated only within such web site, it presents the web site to the Authorized User and processes the designs for Invader Probes and Primary Probes on the Authorized User's local computer. In order to create probe designs, the Authorized User will log in on such web site using the Username and Password and, after the Host Software downloads the Applet to the Authorized User's local computer, the Authorized User will enter input sequence information for generating the designs. The Applet creates the designs using such information and sends the designs to the Host Software or the Servlet as described in this Section 2.1 below. The sequence information entered by the Authorized User will not be sent to the Host Software, but the designs generated by the Applet will be sent to the Host Software unless the Applet is configured to send the output to a Servlet rather than the Host Software. Subject to the terms and conditions of this Agreement, ACLA and its Enabled Customers and Manufacturing Distributors may program the Servlet to store the designs on the server on which the Servlet is installed or at a location that ACLA or the applicable Authorized Designee makes accessible to the server and Servlet all as more fully described in Section 2.4.2 below. ACLA shall provide to TWTI in advance the compatible network address of the server on which the Servlet will be installed s...
AutoNDA by SimpleDocs

Related to Environment and Software

  • Intellectual Property; Software (a) Schedule 4.12 contains a list and description (showing in each case any product, device, process, service, business or publication covered thereby, the registered or other owner, expiration date and number, if any) of all Copyrights, Patent Rights and Trademarks owned by, licensed to or used by the Company.

  • Hardware and Software Requirements In order to access and retain Disclosures electronically, you must satisfy the following computer hardware and software requirements: access to the Internet; an email account and related software capable of receiving email through the Internet; a web browser which is SSL-compliant and supports secure sessions, and hardware capable of running this software.

  • Proprietary Software Depending upon the products and services You elect to access through Electronic Access, You may be provided software owned by BNY Mellon or licensed to BNY Mellon by a BNY Mellon Supplier (“Proprietary Software”). You are granted a limited, non-exclusive, non-transferable license to install the Proprietary Software on Your authorized computer system (including mobile devices registered with BNY Mellon) and to use the Proprietary Software solely for Your own internal purposes in connection with Electronic Access and solely for the purposes for which it is provided to You. You and Your Users may make copies of the Proprietary Software for backup purposes only, provided all copyright and other proprietary information included in the original copy of the Proprietary Software are reproduced in or on such backup copies. You shall not reverse engineer, disassemble, decompile or attempt to determine the source code for, any Proprietary Software. Any attempt to circumvent or penetrate security of Electronic Access is strictly prohibited.

  • Third Party Software Customer acknowledges that in order for MyEcheck to perform the Consulting Services, Customer may need to obtain additional third party services ("Third Party Services") or third party technology ("Third Party Technology"). Customer agrees that the rights and licenses with respect to Third Party Technology and Third Party Services shall be under terms set forth in the pertinent purchase, license or services agreements between Customer and the vendors of such Third Party Software or Third Party Services. Customer shall execute and comply with appropriate purchase, license, or services agreements with respect to any Third Party Software or Third Party Services. Any amounts payable to third party vendors or service providers under such agreements are the sole responsibility of Customer and shall be paid directly by Customer to such third party vendors or service providers. MyEcheck Services Agreement

  • Licensed Software Section 3.17(f).......................................27

  • Software Additional provisions relating to software.

  • Company Software “Company Software” shall mean any software (including software development tools and software embedded in hardware devices, and all updates, upgrades, releases, enhancements and bug fixes) owned, developed (or currently being developed), used, marketed, distributed, licensed or sold by an Acquired Corporation at any time (other than non-customized third-party software that is not incorporated into any Company Product and is licensed to an Acquired Corporation solely in object code form and solely for internal use on a non-exclusive basis).

  • Review Systems The Asset Representations Reviewer will maintain and utilize an electronic case management system to manage the Tests and provide systematic control over each step in the Review process and ensure consistency and repeatability among the Tests.

  • USE OF THIRD PARTY SYSTEMS-LEVEL SOFTWARE State Street and the Fund acknowledge that in connection with the Data Access Services provided under this Addendum, the Fund will have access, through the Data Access Services, to Fund Data and to functions of State Street’s proprietary systems; provided, however that in no event will the Fund have direct access to any third party systems-level software that retrieves data for, stores data from, or otherwise supports the System.

  • Customer Data Customer shall remain the sole and exclusive owner of all Customer Data and other Confidential Information (as hereinafter defined), regardless of whether such data is maintained on magnetic tape, magnetic disk, or any other storage or processing device. All such Customer Data and other Confidential Information shall, however, be subject to regulation and examination by the appropriate auditors and regulatory agencies to the same extent as if such information were on Customer's premises. "Customer Data" means any and all data and information of any kind or nature submitted to M&I by Customer, or received by M&I on behalf of Customer, in connection with the Services.

Time is Money Join Law Insider Premium to draft better contracts faster.