MORPHO OPTIMIZER FRONT-END Sample Clauses

MORPHO OPTIMIZER FRONT-END. Users may Access the Morpho Optimizer Protocol by using the Morpho Optimizer Front-End provided by ADDMO. Then, Users must select among the following Morpho Optimizer versions: - CompoundV2 Optimizer: xxxxx://xxxxxxxx.xxxxxx.xxx/ - AaveV2 Optimizer: xxxxx://xxxxx0.xxxxxx.xxx/ - AaveV3-ETH Optimizer: xxxxx://xxxxx0.xxxxxx.xxx/ The Services provided by ADDMO is limited to granting such Access to Users, through the designated Morpho Optimizer Front-End. ADDMO does not control or operate any version of the Morpho Optimizer Protocol on any Blockchain network. By using the Morpho Optimizer Front-End, you understand that we do not operate any liquidity pools on the Morpho Optimizer Protocol or control the Morpho Optimizer Protocol.
AutoNDA by SimpleDocs

Related to MORPHO OPTIMIZER FRONT-END

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • RE-WEIGHING PRODUCT Deliveries are subject to re- weighing at the point of destination by the Authorized User. If shrinkage occurs which exceeds that normally allowable in the trade, the Authorized User shall have the option to require delivery of the difference in quantity or to reduce the payment accordingly. Such option shall be exercised in writing by the Authorized User.

  • Computer Equipment Recycling Program If this Contract is for the purchase or lease of computer equipment, then Contractor certifies that it is in compliance with Subchapter Y, Chapter 361 of the Texas Health and Safety Code related to the Computer Equipment Recycling Program and the Texas Commission on Environmental Quality rules in 30 TAC Chapter 328.

  • Purchase Order Flip via Ariba Network (AN) The online process allows suppliers to submit invoices via the AN for catalog and non- catalog goods and services. Contractors have the ability to create an invoice directly from their Inbox in their AN account by simply “flipping” the purchase order into an invoice. This option does not require any special software or technical capabilities. For the purposes of this section, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider of MFMP the right and license to use, reproduce, transmit, distribute, and publicly display within the system the information outlined above. In addition, the Contractor warrants and represents that it is authorized and empowered to and hereby grants the State and the third-party provider the right and license to reproduce and display within the system the Contractor’s trademarks, system marks, logos, trade dress, or other branding designation that identifies the products made available by the Contractor under the Contract.

  • Loop Provisioning Involving Integrated Digital Loop Carriers 2.6.1 Where EveryCall has requested an Unbundled Loop and BellSouth uses Integrated Digital Loop Carrier (IDLC) systems to provide the local service to the end user and BellSouth has a suitable alternate facility available, BellSouth will make such alternative facilities available to EveryCall. If a suitable alternative facility is not available, then to the extent it is technically feasible, BellSouth will implement one of the following alternative arrangements for EveryCall (e.g. hairpinning):

  • First Source Hiring Program Contractor must comply with all of the provisions of the First Source Hiring Program, Chapter 83 of the San Francisco Administrative Code, that apply to this Agreement, and Contractor is subject to the enforcement and penalty provisions in Chapter 83.

  • Hepatitis B Vaccine Where the Hospital identifies high risk areas where employees are exposed to Hepatitis B, the Hospital will provide, at no cost to the employees, a Hepatitis B vaccine.

  • Additional Acceptable Uses of Student Data Contractor is prohibited from using Student Data for any secondary use not described in this agreement except:

  • Human Leukocyte Antigen Testing This plan covers human leukocyte antigen testing for A, B, and DR antigens once per member per lifetime to establish a member’s bone marrow transplantation donor suitability in accordance with R.I. General Law §27-20-36. The testing must be performed in a facility that is: • accredited by the American Association of Blood Banks or its successors; and • licensed under the Clinical Laboratory Improvement Act as it may be amended from time to time. At the time of testing, the person being tested must complete and sign an informed consent form that also authorizes the results of the test to be used for participation in the National Marrow Donor program.

  • Access Toll Connecting Trunk Group Architecture 9.2.1 If CBB chooses to subtend a Verizon access Tandem, CBB’s NPA/NXX must be assigned by CBB to subtend the same Verizon access Tandem that a Verizon NPA/NXX serving the same Rate Center Area subtends as identified in the LERG.

Time is Money Join Law Insider Premium to draft better contracts faster.