JAVA Sample Clauses

JAVA. By entering into this Agreement You agree that You have been advised by MOBILE WORKFORCE that the Service may contain software written in Java and that the Java technology is not fault tolerant and is not designed, manufactured, or intended for use as on-line control equipment in hazardous environments requiring fail- safe performance, including, but not limited to, the operation of nuclear facilities, aircraft navigation or communication systems, air traffic control, direct life support machines, or weapons systems, in which the failure of Java technology could lead directly to death, personal injury, or severe physical or environmental damage. ACCORDINGLY, YOU SPECIFICALLY WAIVE ANY CLAIMS THAT YOU MIGHT HAVE AGAINST MOBILE WORKFORCE AND RELEASE MOBILE WORKFORCE FROM ANY LIABILITY FOR DAMAGES INCURRED BY YOU ARISING FROM, IN CONNECTION WITH, OR DUE TO THE EXISTENCE OF JAVA SOFTWARE THAT IS PART OF THE SERVICE. The provisions set forth in this Section 9 are in addition to all the other limitations set forth in this Agreement.
Search the Best Contracts

Draft contracts faster by searching through millions of contracts from the best law firms across all industries.

30+ Reviews on G2 Crowd
JAVA. The first step is installing Java 7 and verifying that only one version of Java is used. Mixing between Java 6 and Java 7, or between OpenJDK and Oracle Java often causes exceptions. Such a mix between versions can easily occur, because applications use different methods to determine the Java path in the file system. Three methods are common for Hadoop and Hadoop-related applications: The environment variable JAVA_HOME should be set on system start and additionally added to the Apache Bigtop Utils configuration file (/etc/default/bigtop-utils). Bigtop is used by various big-data frameworks and can be used by Hadoop to determine the Java version. Furthermore Java should be accessible via the environment variable PATH.

Related to JAVA

  • Games The Private Party shall not be entitled to introduce any arcade type amusement or gaming machines into the Restaurant Facility without the prior written approval of SANParks.

  • Software Development Systems development efforts shall comply with applicable Government-wide Federal Information Processing Standards developed by the National Institute of Standards and Technology, applicable public laws, Office of Management and Budget circulars, and NRC policies and procedures. Particular attention is necessary to incorporate security features in the design of systems that process sensitive data. The format of software deliverables is specified in NRC Bulletin 0904-4. If any deliverable is provided on diskette, the diskette shall be scanned for viruses by the contractor and verified to be free of viruses before delivery to NRC. All software development, modification, or maintenance tasks shall follow general guidance provided in NUREG/BR-0167, “Software Quality Assurance Program and Guidelines.” NRC shall advise the DOE Patent Counsel with respect to any rights in the software that NRC desires under any particular project, which rights include NRC imposing restrictions on use, and distribution of the software by DOE or the Laboratory.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

  • MODERN SLAVERY You hereby affirm your compliance with the Modern Slavery Xxx 0000 and associated guidance. You confirm (a) that you have read, are familiar with and shall not perform an act or omission which is in contravention with, the letter or spirit of the Act; and (b) you carry out regular, meaningful and comprehensive due diligence procedures and have internal policies in place to address any suspected human rights abuse in your business and Group where applicable.

  • Software Licensing Contractor represents and warrants that the software, if any, as delivered to City, does not contain any program code, virus, worm, trap door, back door, time or clock that would erase data or programming or otherwise cause the software to become inoperable, inaccessible, or incapable of being used in accordance with its user manuals, either automatically, upon the occurrence of licensor-selected conditions or manually on command. Contractor further represents and warrants that all third party software, delivered to City or used by Contractor in the performance of the Contract, is fully licensed by the appropriate licensor.

  • Architecture All Redeveloper Improvements shall have consistent architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory building walls, screening walls, or fences shall use the same primary material, color, and detailing as on the main buildings, unless shown differently on approved Exterior Construction Documents.

  • XXX Hosting 10.1 XXX Hosting is not required for resale in the BellSouth region.

  • Industry Troubleshooter Where a difference arises between the parties relating to the dismissal, discipline, or suspension of an employee, or to the interpretation, application, operation, or alleged violation of this Agreement, including any question as to whether a matter is arbitrable, during the term of the Collective Agreement, Xxxxx XxXxxxxxxx, Xxxx Xxxxxx, Xxxxx Xxxxxxxx, or a substitute agreed to by the parties, shall at the request of either party:

  • NO HARDSTOP/PASSIVE LICENSE MONITORING Unless an Authorized User is otherwise specifically advised to the contrary in writing at the time of order and prior to purchase, Contractor hereby warrants and represents that the Product and all Upgrades do not and will not contain any computer code that would disable the Product or Upgrades or impair in any way its operation based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral, or other similar self-destruct mechanisms (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices) or that would permit Contractor to access the Product to cause such disablement or impairment (sometimes referred to as a “trap door” device). Contractor agrees that in the event of a breach or alleged breach of this provision that Authorized User shall not have an adequate remedy at law, including monetary damages, and that Authorized User shall consequently be entitled to seek a temporary restraining order, injunction, or other form of equitable relief against the continuance of such breach, in addition to any and all remedies to which Authorized User shall be entitled.

  • Firmware and software used for operation and maintenance reporting. Notwithstanding the foregoing, Enova will make reasonable efforts to resolve firmware or software problems.