EXAMPLE CASE OF TECHNOLOGY VALIDATION Sample Clauses

EXAMPLE CASE OF TECHNOLOGY VALIDATION. UCM‌ This example case demonstrates technology validation that are being adopted and adapted for the BEACONING platform as well as the initative to collaborate with existing local projects. UCM as lead of the learning analytics task, has collaborated with the DownTown project providing the technology and the experimental design for the scientific validation experiment to test a serious game. Specifically, UCM incorporated the analytics system to collect data during the experiment to the preexisting game that was produced by CEIEC (Center for Research and Innovation in Knowledge Management), an Institute of Francisco de Vitoria University, in cooperation with Down Madrid Association. The experiment, conducted in May 2017, involved 45 people with different cognitive disabilities (mainly Down Syndrome) and is a pilot of BEACONING. The serious game, Downtown, A Subway Adventure, has had a great impact: - Madrid metro internal TV. A video promoting the serious game DownTown appeared on the subway interval television from May 29th to June 3rd. The number of passengers of the metro each day is more than 1 million people. This video already describes the experiment and the data analytics capture process proposed by BEACONING, even if BEACONING is not directly mentioned.
AutoNDA by SimpleDocs
EXAMPLE CASE OF TECHNOLOGY VALIDATION. ATS‌ This example case demonstrates the process for collecting feedback from stakeholders with regards to the integrated BEACONING prototype and the corresponding components as well as the engagement with stakeholders from the schools, industry and research. ATS, XXXXXXXXX’ s lead teachical partner (WP4 lead) has organized a BEACONING Demo Session at the International Scientific Conference on "eLearning and Software for Education" (eLSE 2017) in collaboration with BEACONING partners and the Romanian Partnership Lab of the Advanced Distributed Learning Initiative. The demo session has showcased the BEACONING core components: the Game Plot (Meta game); the Minigames; the Location-based componnet; the Authoring Tool; the User Interface.

Related to EXAMPLE CASE OF TECHNOLOGY VALIDATION

  • DEVELOPMENT OR ASSISTANCE IN DEVELOPMENT OF SPECIFICATIONS REQUIREMENTS/ STATEMENTS OF WORK Firms and/or individuals that assisted in the development or drafting of the specifications, requirements, statements of work, or solicitation documents contained herein are excluded from competing for this solicitation. This shall not be applicable to firms and/or individuals providing responses to a publicly posted Request for Information (RFI) associated with a solicitation.

  • For Product Development Projects and Project Demonstrations  Published documents, including date, title, and periodical name.  Estimated or actual energy and cost savings, and estimated statewide energy savings once market potential has been realized. Identify all assumptions used in the estimates.  Greenhouse gas and criteria emissions reductions.  Other non-energy benefits such as reliability, public safety, lower operational cost, environmental improvement, indoor environmental quality, and societal benefits.  Data on potential job creation, market potential, economic development, and increased state revenue as a result of the project.  A discussion of project product downloads from websites, and publications in technical journals.  A comparison of project expectations and performance. Discuss whether the goals and objectives of the Agreement have been met and what improvements are needed, if any.

  • AREAS OF COLLABORATION The School will collaborate under Xxxx Innovation Mission to establish, operate and support ATL in India within the school premises with financial support from NITI Aayog.

  • Technology Research Analyst Job# 1810 General Characteristics Maintains a strong understanding of the enterprise’s IT systems and architectures. Assists in the analysis of the requirements for the enterprise and applying emerging technologies to support long-term business objectives. Responsible for researching, collecting, and disseminating information on emerging technologies and key learnings throughout the enterprise. Researches and recommends changes to foundation architecture. Supports research projects to identify and evaluate emerging technologies. Interfaces with users and staff to evaluate possible implementation of the new technology in the enterprise, consistent with the goal of improving existing systems and technologies and in meeting the needs of the business. Analyzes and researches process of deployment and assists in this process.

  • Notice of Technological Change (a) For the purpose of technological change, the Employer agrees to provide the Union with as much notice as possible, but in any event not less than sixty (60) days notice of a technological change.

  • LIMITATIONS ON REVERSE ENGINEERING, DECOMPILATION AND DISASSEMBLY You may not reverse engineer, decompile, or disassemble the Software, except and only to the extent that such activity is expressly permitted by applicable law notwithstanding this limitation.

  • Technical Feasibility of String While ICANN has encouraged and will continue to encourage universal acceptance of all top-­‐level domain strings across the Internet, certain top-­‐level domain strings may encounter difficulty in acceptance by ISPs and webhosters and/or validation by web applications. Registry Operator shall be responsible for ensuring to its satisfaction the technical feasibility of the TLD string prior to entering into this Agreement.

  • Research, Science and Technology Cooperation 1. The aims of cooperation in research, science and technology, carried out in the mutual interest of the Parties and in compliance with their policies, will be: (a) to build on existing agreements already in place for cooperation on research, science and technology; (b) to encourage, where appropriate, government agencies, research institutions, universities, private companies and other research organizations in the Parties to conclude direct arrangements in support of cooperative activities, programs or projects within the framework of this Agreement, specially related to trade and commerce; and (c) to focus cooperative activities towards sectors where mutual and complementary interests exist, with special emphasis on information and communication technologies and software development to facilitate trade between the Parties. 2. The Parties will encourage and facilitate, as appropriate, the following activities including, but not limited to:

  • Application of Funding Techniques to Programs 6.3.1 The State shall apply the following funding techniques when requesting Federal funds for the component cash flows of the programs listed in sections 4.2 and 4.3 of this Agreement.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

Time is Money Join Law Insider Premium to draft better contracts faster.