Methodological introduction Sample Clauses

Methodological introduction. D4.2 investigates how the key TSLA detailed in section 2.2 can be refined into technical Trustworthiness attributes and further into technical KPIs that can be used for trust management. Again, Trust is first a subjective value given by the consumer of a service to the service provider. With the convergence of Telecommunication and Information Technologies, Trust evaluation is even more complex since we evolve in a multi-tenant, where the infrastructures are shared between different consumers, multi-party, where the underlying infrastructure is operated by different operators, and multi-domains where computing, storage and telecommunication are converging and dispatch across the infrastructure.
AutoNDA by SimpleDocs

Related to Methodological introduction

  • Processes Any employer, employee, trade union or employer’s association may at any point in time apply for an exemption from any of the provisions of this Collective Agreement. The applicant is required to complete and submit in writing with the relevant office of the Council, a fully and properly completed prescribed application for exemption form, accompanied by all relevant supporting documentation.

  • Third Party Technology The Company makes use of third party technology to collect information required for traffic measurement, research, and analytics. Use of third party technology entails data collection. We therefore would like to inform clients the Company enables third parties to place or read cookies located on the browsers of users entering the Company’s domain. Said third parties may also use web beacons to collect information through advertising located on the Company’s web site. Please note that you may change your browser settings to refuse or disable Local Shared Objects and similar technologies; however, by doing so you may be disabling some of the functionality of Company’s services.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Benchmarking 19.1 The Parties shall comply with the provisions of Framework Schedule 12 (Continuous Improvement and Benchmarking) in relation to the benchmarking of any or all of the Goods and/or Services.

  • Benchmarking Process 2.2.1 The Supplier shall produce and send to the Authority for Approval, a draft plan for the Benchmark Review.

  • Licensed Software Computer program(s) provided by Contractor in connection with the Deliverables, subject to Section 14 of this Contract.

  • Protocols Each party hereby agrees that the inclusion of additional protocols may be required to make this Agreement specific. All such protocols shall be negotiated, determined and agreed upon by both parties hereto.

  • Research Use The Requester agrees that if access is approved, (1) the PI named in the DAR and (2) those named in the “Senior/Key Person Profile” section of the DAR, including the Information Technology Director and any trainee, employee, or contractor1 working on the proposed research project under the direct oversight of these individuals, shall become Approved Users of the requested dataset(s). Research use will occur solely in connection with the approved research project described in the DAR, which includes a 1-2 paragraph description of the proposed research (i.e., a Research Use Statement). Investigators interested in using Cloud Computing for data storage and analysis must request permission to use Cloud Computing in the DAR and identify the Cloud Service Provider (CSP) or providers and/or Private Cloud System (PCS) that they propose to use. They must also submit a Cloud Computing Use Statement as part of the DAR that describes the type of service and how it will be used to carry out the proposed research as described in the Research Use Statement. If the Approved Users plan to collaborate with investigators outside the Requester, the investigators at each external site must submit an independent DAR using the same project title and Research Use Statement, and if using the cloud, Cloud Computing Use Statement. New uses of these data outside those described in the DAR will require submission of a new DAR; modifications to the research project will require submission of an amendment to this application (e.g., adding or deleting Requester Collaborators from the Requester, adding datasets to an approved project). Access to the requested dataset(s) is granted for a period of one (1) year, with the option to renew access or close-out a project at the end of that year. Submitting Investigator(s), or their collaborators, who provided the data or samples used to generate controlled-access datasets subject to the NIH GDS Policy and who have Institutional Review Board (IRB) approval and who meet any other study specific terms of access, are exempt from the limitation on the scope of the research use as defined in the DAR.

  • COVID-19 Protocols Contractor will abide by all applicable COVID-19 protocols set forth in the District’s Reopening and COVID-19 Mitigation Plan and the safety guidelines for COVID-19 prevention established by the California Department of Public Health and the Ventura County Department of Public Health.

  • Know-How The term “

Time is Money Join Law Insider Premium to draft better contracts faster.