Technology stack Sample Clauses

Technology stack. In order to keep the architecture coherent and manageable, and simplify hosting and maintenance, a controlled set of technologies will be used to implement the shared components of the platform. As a general principle, open source technologies will be used to implement the platform (“open source” defined as software licensed under an OSI1-approved license that is included in the list of 1 Open Source Initiative, see xxxx://xxxxxxxxxx.xxx/. EUPL-compatible licenses2). Exceptions will be proprietary or non EUPL-compatible licenses for software belonging to a partner in the colMOOC consortium, or specific products, where no EUPL-compatible alternatives exist.
AutoNDA by SimpleDocs
Technology stack. Technology Stack selection is the key to the successful development and execution of any software platform or product. Which Blockchain architecture(s), platform(s), and other existing technologies and partners should be used? Blockchain and DLT Technologies integrated with machine learning, encryption, cloud storage, and other technologies are clearly part of the future. Given that the BlakFX project will need to address the scalability trilemma, DLT architecture, compliance issues, on and off-chain storage, BCII would provide a deep dive review to make sure scalability and architecture is sound and thorough. STRATEGIC PARTNERSHIPS BCII can provide access and introductions to: ● Existing Blockchain technology companies that have already developed technology that could be applicable to the development of Sovereignty’s product line. ● Potential ICO’s that would use the BlakEco and Blak247 coins for their projects ● Investors, syndicates, and funds across the globe. Proprietary & Confidential

Related to Technology stack

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.

  • Technology Upgrades Notwithstanding any other provision of this Agreement, Verizon shall have the right to deploy, upgrade, migrate and maintain its network at its discretion. The Parties acknowledge that Verizon, at its election, may deploy fiber throughout its network and that such fiber deployment may inhibit or facilitate PNG’s ability to provide service using certain technologies. Nothing in this Agreement shall limit Verizon's ability to modify its network through the incorporation of new equipment or software or otherwise. PNG shall be solely responsible for the cost and activities associated with accommodating such changes in its own network.

  • Technology Access A. Contractor expressly acknowledges that state funds may not be expended in connection with the purchase of an automated information system unless that system meets certain statutory requirements relating to accessibility by persons with visual impairments. Accordingly, Contractor represents and warrants to System Agency that the technology provided to System Agency for purchase (if applicable under this Contract or any related Solicitation) is capable, either by virtue of features included within the technology or because it is readily adaptable by use with other technology, of:

  • Technology Research Analyst Job# 1810 General Characteristics Maintains a strong understanding of the enterprise’s IT systems and architectures. Assists in the analysis of the requirements for the enterprise and applying emerging technologies to support long-term business objectives. Responsible for researching, collecting, and disseminating information on emerging technologies and key learnings throughout the enterprise. Researches and recommends changes to foundation architecture. Supports research projects to identify and evaluate emerging technologies. Interfaces with users and staff to evaluate possible implementation of the new technology in the enterprise, consistent with the goal of improving existing systems and technologies and in meeting the needs of the business. Analyzes and researches process of deployment and assists in this process.

  • Technology License 4.1 Unless any event described in Article 2.2 or 2.3 of this Agreement occurs, all of the technology required to be licensed for any of Party B’s business shall be provided by Party A on an exclusive basis. Party A will try its best to license Party B to use the technology owned by Party A, or re-license Party B to use the technology as approved by the owner.

  • New Technology When new or updated technology is introduced into a workplace, it will be the responsibility of the employer to provide appropriate and, if necessary, ongoing training to the employees directly affected. Such training will include any health and safety implications or information that will enable employees to operate the equipment without discomfort and will help maintain their general well-being.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

  • Software Development Software designs, prototypes, and all documentation for the final designs developed under this agreement must be made fully transferable upon direction of NSF. NSF may make the software design, prototype, and documentation for the final design available to competitors for review during any anticipated re-competition of the project.

  • Manufacturing Technology Transfer With respect to each Technology Transfer Product, upon AbbVie’s written request after the Inclusion Date for the Included Target to which such Technology Transfer Product is Directed, Morphic shall effect a full transfer to AbbVie or its designee (which designee may be an Affiliate or a Third Party manufacturer) of all Morphic Know-How and Joint Know-How relating to the then-current process for the Manufacture of such Technology Transfer Product (the “Manufacturing Process”) and to implement the Manufacturing Process at facilities designated by AbbVie (such transfer and implementation, as more fully described in this Section 5.3, the “Manufacturing Technology Transfer”). To assist with the Manufacturing Technology Transfer, Morphic will make its personnel reasonably available to AbbVie during normal business hours for up to [***] FTE hours with respect to each Included Target (in each case, free of charge to AbbVie) to transfer and implement the Manufacturing Process under this Section 5.3. Thereafter, if requested by AbbVie, Morphic shall continue to perform such obligations; provided, that AbbVie will reimburse Morphic for its full-time equivalent (FTE) costs (for clarity, in excess of [***] FTE hours) and any reasonable and verifiable out-of-pocket costs incurred in providing such assistance. CERTAIN CONFIDENTIAL INFORMATION CONTAINED IN THIS DOCUMENT, MARKED BY [***], HAS BEEN OMITTED BECAUSE IT IS NOT MATERIAL AND WOULD LIKELY CAUSE COMPETITIVE HARM TO THE COMPANY IF PUBLICLY DISCLOSED.

  • Antivirus software All workstations, laptops and other systems that process and/or store PHI COUNTY discloses to CONTRACTOR or CONTRACTOR creates, receives, maintains, or transmits on behalf of COUNTY must have installed and actively use comprehensive anti-virus software solution with automatic updates scheduled at least daily.

Time is Money Join Law Insider Premium to draft better contracts faster.