Software Design Sample Clauses

Software Design. Within 30 days from when Consultant receives the necessary information about the Company - which shall include the current software system, software code, software design plan, software design documentation papers and any other information requested by Consultant - Consultant shall provide the Company with an automation engine that shall compute statements all designed in a web-based environment (hereafter "Software Component"). ii.
AutoNDA by SimpleDocs
Software Design. The software used to operate the radios shall conform to the Specifications and the manufacturer specifications set forth in Exhibit A-2 to this Schedule A.
Software Design. The first category of risk lies with the software design. In order to be acceptable, the software using Artificial Intelligence mechanisms should be unique and designed by a public body, such as the ICAO, or during a diplomatic conference. This would avoid disputes over the nature of the algorithm used, given that, as explained by Xxxxxx van den Xxxxxxx, algo- rithms are opinions integrated into code.84 It would also guarantee that the algorithm was publicly known, with the consequence that its application could be verified at any time in order to detect any possible corruption.85 Therefore, to avoid these risks, each State would have to play three active roles in this process.
Software Design. The software design criteria and requirements are:
Software Design. 1. All written and oral information and materials disclosed or provided by the Inventor to the Leesee under this Agreement is Software Design regardless of whether it was provided before or after the date of this Agreement or how it was provided to the Leesee.
Software Design. Software will be designed and developed by the contractor. The contractor shall analyze the reuse of the Army Long Range Targeting and Acquisition System (LRATS) Training and Maintenance System (TAMS). The contractor shall report on the percent of code they were able to reuse by module. The contractor shall report on the percent of Army TAMS code that must be modified. If the projected percent of Army TAMS code that must be modified is greater than 20 percent, the contactor must justify the use of the old code. There will be four (4) major sub-systems of JTAMS as follows:
Software Design. (3) Systems programming;
AutoNDA by SimpleDocs
Software Design. Bunker level indication from 0 – 100%. • Warning alarm indicating low & low low bunker level.
Software Design. Our solution required a number of software design decisions to be made based on the design criteria outlined in the introduction. The most important was that OpenStack should be used in combination with TRL25 9 XXXX middleware, so that proper handling of XXXX-level actions were not demanded from OpenStack itself. This includes: (a) metadata handling, as per eduGAIN or other federation requirements, with signature verification, (b) handling of stand-alone AAs, (c) collaboration with discovery services, and (d) XXXX single logout. As previously discussed, using OpenStack with mature XXXX middleware achieved our goal of reusing mature components. Moreover, it was important that the new software should not only be a patch to the OpenStack Horizon or Keystone components. Because of the encapsulation of new functionality in its own module, no regular patching of any other OpenStack components will be necessary. Python and Django were selected for consistency with other OpenStack components. It was also important to align the software with the OpenStack Keystone project’s vision for the future. At the OpenStack CEE Day 2015 event, a converged solution for the future was agreed with the head of the Keystone project, Xxxxxx Xxxxxxxx. From the solution (ii), the user/project creation part would be separated into a standalone ‘signup page’ web application, using Keystone API calls, and the user/project/tenant created at signup, if necessary. The mainline code would then perform the rest of the authentication and map the XXXX session to Keystone users. The rest of the (ii) solution would be discontinued, and Horizon would not be patched in the future. Fainberg indicated that the OpenStack Keystone project is open to accept improvement patches to (iii) as long as they do not involve user/tenant creation (or de-provisioning). The solution needed to ensure that the user is always properly provisioned into Keystone before it makes contact with OpenStack. Otherwise, the user would successfully login into Shibboleth federation middleware, but would be denied access and greeted with an error message from Keystone. According to our design criteria, this should not be implemented in a hook of an OpenStack module. As a result, we relied on the sessionHook26 ability of Shibboleth SP. The software also needed to include the means to request user consent, achieved by a website presented to the user, if necessary. The resulting software, regsite, in collaboration with WebSSO (see S...
Software Design. The contractor shall design the software and computer code necessary to execute required functionality on all computers incorporated into the prototype set. The contractor shall create a development plan that provides a build schedule, milestones for discrete levels of functionality and a software test approach. The contractor shall assemble a software development environment using commercial computers and third party application products to assist in the generation of computer code. The contractor shall describe the algorithm functionality, data flow, timing, memory management, and interface control planned for the software implementation.
Time is Money Join Law Insider Premium to draft better contracts faster.