{"component": "definition", "props": {"groups": [{"snippet": "means technologies used, operational practices and the ways in which installations are designed, built, maintained, operated and decommissioned;", "snippet_links": [{"key": "operational-practices", "type": "clause", "offset": [25, 46]}], "size": 40, "samples": [{"hash": "gEdN3oWJu3d", "uri": "/contracts/gEdN3oWJu3d#techniques", "label": "Minamata Convention on Mercury", "score": 22.8877481177, "published": true}, {"hash": "8mkCaSKJxwp", "uri": "/contracts/8mkCaSKJxwp#techniques", "label": "Minamata Convention on Mercury", "score": 22.8877481177, "published": true}, {"hash": "6Coscuh0i2D", "uri": "https://www.zhiyanbao.cn/index/partFile/5/unep/2022-03/5_14345.pdf", "label": "www.zhiyanbao.cn", "score": 19.7263179834, "published": false}], "hash": "c3190d39c04898a913c06e4e4b053287", "id": 1}, {"snippet": "means technologies used, operational practices and the ways in which installations are designed, built, maintained, operated, and decom- missioned.;", "snippet_links": [{"key": "operational-practices", "type": "clause", "offset": [25, 46]}], "size": 3, "samples": [{"hash": "6k4JpzNci7T", "uri": "https://ipen.org/sites/default/files/documents/ipen-booklet-hg-treaty-v1_4w.pdf", "label": "ipen.org", "score": 6.0595482546, "published": false}, {"hash": "iV3eNKstnSN", "uri": "https://ipen.org/pdfs/ipen-booklet-hg-treaty-v1_5w.pdf", "label": "ipen.org", "score": 6.0595482546, "published": false}, {"hash": "gKmqBkH143Z", "uri": "https://ipen.org/pdfs/ipen-booklet-hg-treaty-en.pdf", "label": "ipen.org", "score": 6.0595482546, "published": false}], "hash": "1d5af45b6fa2ae3590fc3accc775cf19", "id": 2}, {"snippet": "means 1) machine learning approaches (including supervised, unsupervised and reinforcement learning), using a wide variety of methods including deep learning; 2) logic- and knowledge-based approaches (including knowledge representation, inductive (logic) programming, knowledge bases, inference and deductive engines, (symbolic) reasoning and expert systems); and 3) Statistical approaches, Bayesian estimation, search and optimisation methods.", "snippet_links": [{"key": "machine-learning", "type": "definition", "offset": [9, 25]}, {"key": "deep-learning", "type": "clause", "offset": [144, 157]}], "size": 3, "samples": [{"hash": "iqPNjoYqMUk", "uri": "https://royalarmouries.org/sites/default/files/2025-02/RA-Terms-and-Conditions-Services-PA23-v.1.pdf", "label": "Contract for Services", "score": 21.9582470506, "published": false}, {"hash": "hMHoal5UsJN", "uri": "https://royalarmouries.org/sites/default/files/2024-04/Terms-and-Conditions-Services-(RA).pdf", "label": "Contract for Services", "score": 14.1252566735, "published": false}], "hash": "11f74736ec14e3b3b25dbeb9cf46bec6", "id": 3}, {"snippet": "means the operating procedures described in the Licensed Post Office Manual and Post Office Rules.", "snippet_links": [{"key": "operating-procedures", "type": "definition", "offset": [10, 30]}, {"key": "office-manual", "type": "definition", "offset": [62, 75]}, {"key": "office-rules", "type": "definition", "offset": [85, 97]}], "size": 2, "samples": [{"hash": "djWLGuvJ7wA", "uri": "/contracts/djWLGuvJ7wA#techniques", "label": "Licensed Post Office Agreement", "score": 24.4291581109, "published": true}, {"hash": "1Wf9JfZi6I3", "uri": "https://www.aph.gov.au/DocumentStore.ashx?id=0def8bf0-bb15-4ede-923e-2304b8cded46&subId=31478", "label": "www.aph.gov.au", "score": 8.1704312115, "published": false}], "hash": "6f92c2e89ca91f2da200b4e425a84930", "id": 4}, {"snippet": "means both the technology used and the way, the installation is designed, constructed, maintained, operated, and decommissioned [7].", "snippet_links": [{"key": "the-technology", "type": "clause", "offset": [11, 25]}, {"key": "the-installation", "type": "clause", "offset": [44, 60]}], "size": 1, "samples": [{"hash": "arPGwjQPC6R", "uri": "https://www.international-climate-initiative.com/fileadmin/iki/Dokumente/Publikationen/Projekte/11_I__046/20._FS_Abwasserentsorgung_neu.pdf", "label": "www.international-climate-initiative.com", "score": 7.4859685147, "published": false}], "hash": "fdc728d6206d06797beb4bb17e3e6eb6", "id": 5}, {"snippet": "means technologies used, operational practices and the ways in", "snippet_links": [{"key": "operational-practices", "type": "clause", "offset": [25, 46]}], "size": 1, "samples": [{"hash": "5YTR3suMDa8", "uri": "https://data.qanoon.om/treaties/2020-0058AEN.pdf", "label": "data.qanoon.om", "score": 10.8590006845, "published": false}], "hash": "fc478113fc8ab531a168a6f4d992f582", "id": 6}, {"snippet": "means technologies used, operational practices and the ways in which installations are designed, built, maintained, operated and decommissioned; as defined by Art. 2, of the Minamata Convention.", "snippet_links": [{"key": "operational-practices", "type": "clause", "offset": [25, 46]}], "size": 1, "samples": [{"hash": "19B2tAQAWos", "uri": "https://downloads.unido.org/ot/26/80/26804366/Ghana%20CEO%2011%20May%202022_GEF_ID10616.pdf", "label": "downloads.unido.org", "score": 8.9507186858, "published": false}], "hash": "a711f2ecc08850b4d51160c2b2e81a00", "id": 7}, {"snippet": "means technologies used, operational practices and the ways in which installations are designed, built, main- tained, operated and decommissioned;", "snippet_links": [{"key": "operational-practices", "type": "clause", "offset": [25, 46]}], "size": 1, "samples": [{"hash": "7M0qfEKzul6", "uri": "https://zoek.officielebekendmakingen.nl/dossier/trb-2013-239.pdf", "label": "zoek.officielebekendmakingen.nl", "score": 6.9493497604, "published": false}], "hash": "6545c2a829c2e412ecb0a7484c92b8a6", "id": 8}, {"snippet": "will include both the technology used and the way in which preventative systems are designed, built, maintained, operated and used, including through practical application, and contractual and other legal means;", "snippet_links": [{"key": "the-technology", "type": "clause", "offset": [18, 32]}, {"key": "practical-application", "type": "definition", "offset": [150, 171]}], "size": 1, "samples": [{"hash": "2vFX8rACYnf", "uri": "/contracts/2vFX8rACYnf#techniques", "label": "Television License Agreement", "score": 25.3186685539, "published": true}], "hash": "8ce7936055f315911948a8ef1dd8e509", "id": 9}, {"snippet": "means the techniques used as well as the design, construction, maintenance, operation and shutdown of the installation;", "snippet_links": [{"key": "the-design", "type": "clause", "offset": [37, 47]}, {"key": "the-installation", "type": "clause", "offset": [102, 118]}], "size": 1, "samples": [{"hash": "2UFMOsDvR4W", "uri": "http://www.verification-etv.fr/upload/Le_programme_ETV/ETV_Report_energy_INERIS_ADEME_eng.pdf", "label": "www.verification-etv.fr", "score": 4.8754277892, "published": false}], "hash": "5b9ff8644d1252dc6a353099e7e8d4e1", "id": 10}], "next_curs": "ClcSUWoVc35sYXdpbnNpZGVyY29udHJhY3RzcjMLEhpEZWZpbml0aW9uU25pcHBldEdyb3VwX3Y1NiITdGVjaG5pcXVlcyMwMDAwMDAwYQyiAQJlbhgAIAA=", "definition": {"snippet": "means technologies used, operational practices and the ways in which installations are designed, built, maintained, operated and decommissioned;", "title": "Techniques", "size": 57, "id": "techniques", "examples": ["Supplier will maintain and implement secure application development policies, procedures, and standards that are aligned to Industry Standard practices (e.g., SANS Top 35 Security Development <strong>Techniques</strong> and Common Security Errors in Programming and the OWASP Top Ten project).", "International Organization for Standardization/International Electrotechnical Commission (ISO/IEC) 27002, Information Technology \u2014 Security <strong>Techniques</strong> \u2014 Code of Practice for Information Security Management.", "When extracting ACEIP Content, Axon will use commercially reasonable efforts to aggregate, transform or de-identify Customer Content so that the extracted ACEIP Content is no longer reasonably capable of being associated with, or could reasonably be linked directly or indirectly to a particular individual (&quot;Privacy Preserving Technique(s)&quot;).", "Continue to assist Owner with Project Strategies, Technologies, and <strong>Techniques</strong> that Owner has chosen to implement.", "When extracting ACEIP Content, Axon will use commercially reasonable efforts to aggregate, transform or de- identify Agency Content so that the extracted ACEIP Content is no longer reasonably capable of being associated with, or could reasonably be linked directly or indirectly to a particular individual (&quot;Privacy Preserving Technique(s)&quot;).", "See, generally, \u2587\u2587\u2587\u2587\u2587\u2587\u2587\u2587, Criminal Pre- Trials\u2014Useful <strong>Techniques</strong>, 29 F.R.D. 442 (1962); Estes, Pre-Trial Conferences in Criminal Cases, 23 F.R.D. 560 (1959); \u2587\u2587\u2587\u2587\u2587\u2587\u2587, Pre-Trial in Criminal Cases, 23 F.R.D. 551 (1959); \u2587\u2587\u2587\u2587\u2587\u2587\u2587, Pre-Trial in Criminal Cases, 42 J.Am.Jud.Soc.", "In preparing the Preliminary Design Phase documents, use any specific applicable Project Strategies, Technologies, and <strong>Techniques</strong> authorized by Owner during or following the Study and Conceptual Phase, and include sustainable features, as appropriate, pursuant to Owner\u2019s instructions.", "<strong>Techniques</strong> include Inpatient admission review, continued Inpatient Stay review, discharge planning, post-admission review, and case management.", "Full-time and regular part-time employees of the Employer who are within two (2) months of graduating with a University degree or College diploma (e.g. M.L.S., Baccalaureate or Library <strong>Techniques</strong> diploma) will be considered eligible to apply for posted positions which require the respective qualifications.", "<strong>Techniques</strong> of Water Resources Investigations of the United States Geological Survey, Laboratory Theory and Methods for Sediment Analysis, most current update."], "related": [["processes", "Processes", "Processes"], ["designs", "Designs", "Designs"], ["available-techniques", "available techniques", "available <strong>techniques</strong>"], ["protocols", "Protocols", "Protocols"], ["technique-factors", "Technique factors", "Technique factors"]], "related_snippets": [], "updated": "2025-07-06T21:58:41+00:00"}, "json": true, "cursor": ""}}