Extensibility and Growth Sample Clauses

Extensibility and Growth. The [***]* will be designed so that the system can be easily extended to support future enhanced services of the UAP 1000 product. ------------------------ * CONFIDENTIAL TREATMENT REQUESTED. CONFIDENTIAL PORTION HAS BEEN FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION.
AutoNDA by SimpleDocs
Extensibility and Growth. The [***]* will be designed so that the system can be easily extended to support [***]*. ------------------------ * CONFIDENTIAL TREATMENT REQUESTED. CONFIDENTIAL PORTION HAS BEEN FILED SEPARATELY WITH THE SECURITIES AND EXCHANGE COMMISSION.

Related to Extensibility and Growth

  • Electronic and Information Resources Accessibility and Security Standards a. Applicability: The following Electronic and Information Resources (“EIR”) requirements apply to the Contract because the Grantee performs services that include EIR that the System Agency's employees are required or permitted to access or members of the public are required or permitted to access. This Section does not apply to incidental uses of EIR in the performance of the Agreement, unless the Parties agree that the EIR will become property of the State of Texas or will be used by HHSC’s clients or recipients after completion of the Agreement. Nothing in this section is intended to prescribe the use of particular designs or technologies or to prevent the use of alternative technologies, provided they result in substantially equivalent or greater access to and use of a Product.

  • Experience, Financial Capability and Suitability Subscriber is: (i) sophisticated in financial matters and is able to evaluate the risks and benefits of the investment in the Shares and (ii) able to bear the economic risk of its investment in the Shares for an indefinite period of time because the Shares have not been registered under the Securities Act (as defined below) and therefore cannot be sold unless subsequently registered under the Securities Act or an exemption from such registration is available. Subscriber is capable of evaluating the merits and risks of its investment in the Company and has the capacity to protect its own interests. Subscriber must bear the economic risk of this investment until the Shares are sold pursuant to: (i) an effective registration statement under the Securities Act or (ii) an exemption from registration available with respect to such sale. Subscriber is able to bear the economic risks of an investment in the Shares and to afford a complete loss of Subscriber’s investment in the Shares.

  • Access to Information Systems Access, if any, to DXC’s Information Systems is granted solely to perform the Services under this Order, and is limited to those specific DXC Information Systems, time periods and personnel as are separately agreed to by DXC and Supplier from time to time. DXC may require Supplier’s employees, subcontractors or agents to sign individual agreements prior to access to DXC’s Information Systems. Use of DXC Information Systems during other time periods or by individuals not authorized by DXC is expressly prohibited. Access is subject to DXC business control and information protection policies, standards and guidelines as may be modified from time to time. Use of any other DXC Information Systems is expressly prohibited. This prohibition applies even when an DXC Information System that Supplier is authorized to access, serves as a gateway to other Information Systems outside Supplier’s scope of authorization. Supplier agrees to access Information Systems only from specific locations approved for access by DXC. For access outside of DXC premises, DXC will designate the specific network connections to be used to access Information Systems.

  • Responsibility and Control Notwithstanding any other provision of this Agreement, it is understood and agreed that the Trust reserves the right to direct, approve or disapprove any action hereunder taken on its behalf by the Subadviser, provided, however, that the Subadviser shall not be liable for any losses to the Trust resulting from the Trust’s direction, or from the Trust’s disapproval of any action proposed to be taken by the Subadviser.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at xxxxx://xxx.xx.xxx/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Human and Financial Resources to Implement Safeguards Requirements 10. The Borrower shall make available or cause the State and the DISCOMs to make available necessary budgetary and human resources to fully implement the EMP, the RP and any IPP.

  • Orientation and In-Service Program The Hospital recognizes the need for a Hospital Orientation Program of such duration as it may deem appropriate taking into consideration the needs of the Hospital and the nurses involved.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Access to Information; Independent Investigation Prior to the execution of this Agreement, the Subscriber has had the opportunity to ask questions of and receive answers from representatives of the Company concerning an investment in the Company, as well as the finances, operations, business and prospects of the Company, and the opportunity to obtain additional information to verify the accuracy of all information so obtained. In determining whether to make this investment, Subscriber has relied solely on Subscriber’s own knowledge and understanding of the Company and its business based upon Subscriber’s own due diligence investigation and the information furnished pursuant to this paragraph. Subscriber understands that no person has been authorized to give any information or to make any representations which were not furnished pursuant to this Section 2 and Subscriber has not relied on any other representations or information in making its investment decision, whether written or oral, relating to the Company, its operations and/or its prospects.

  • Year 2000 Compatibility Borrower shall take all action necessary to assure that Borrower's computer based systems are able to operate and effectively process data including dates on and after January 1, 2000. At the request of Bank, Borrower shall provide Bank assurance acceptable to Bank of Borrower's Year 2000 compatibility.

Time is Money Join Law Insider Premium to draft better contracts faster.