NTOP Clause Samples

NTOP. (a) Each of IDT Parent, IDT Domestic-Union, LLC, a Delaware limited liability company and a subsidiary of IDT Parent (“IDT D-U”), and IDT Investments, Inc., a Nevada corporation and a subsidiary of IDT Parent (“IDT Investments” and together with IDT D-U, the “IDT Members”), hereby consents to and waives any and all rights it may have with respect to the transfer of Seller Subsidiaries Stock in the Mergers and the resultant transfer of all of the indirect interests of Liberty Parent and LMC Animal Planet in NTOP and Net2Phone, pursuant to (i) the Second Amended and Restated Limited Liability Company Agreement of NTOP Holdings, LLC, dated as of October 19, 2001 (the “NTOP LLC Agreement”), including, without limitation, pursuant to Section 9.2 thereof, and (ii) the NTOP Holdings, LLC Right of First Offer Agreement, dated as of January 6, 2003, as amended by Amendment No. 1 thereto, dated as of December 1, 2004, by and among IDT Parent, the IDT Members, Liberty Parent, Liberty N2P, Liberty N2P II and NTOP (the “NTOP ROFR Agreement”), including, without limitation, pursuant to Section 2.1(a) thereof. (b) Each of the parties to the NTOP LLC Agreement agrees to forebear from exercising any rights such party may have pursuant to Section 10.1(a)(i) of NTOP LLC Agreement and/or pursuant to the NTOP ROFR Agreement, in each case, until the earlier of the consummation of the transactions contemplated hereby or the termination of this Agreement.
NTOP. ‌ Ntop [Ntop] is an integrated tool that can do various kinds of measurements and types of analysis on IP traffic. The four main functions of Ntop are traffic measurement, traffic monitoring, network optimi- zation and planning, and detection of network security violations. Ntop is available as an open source package [OpenSource]. The basic operation of Ntop is the following. The tool in installed on a machine in a subnetwork, and starts capturing and analysing all packets that can be observed by that machine. This is done by put- ting the network card of the machine into promiscuous mode. This technique can therefore only be applied within a broadcast domain, for instance a shared ethernet segment. The information about the captured packets is then used to perform the four main Ntop functions.
NTOP. Section 6.08 Rule 144 Section 6.09 Asset Maintenance