Agro Intelligence Sample Clauses

Agro Intelligence. 8 3.2 TWT Gmbh . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 3.3 ClearSy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.4 United Technologies . . . . . . . . . . . . . . . . . . . . . . . . 13 3.5 Key Points from the Case Studies . . . . . . . . . . . . . . . . 15
AutoNDA by SimpleDocs
Agro Intelligence 

Related to Agro Intelligence

  • OVATIONS FOOD SERVICES, L.P. dba SPECTRA All food and beverage service must be discussed with and approved by Spectra, the OCFEC Master Concessionaire. FORM F-31 AGREEMENT NO. R-026-18 DATE May 16, 2018 REVIEWED APPROVED RENTAL AGREEMENT FAIRTIME INTERIM XX THIS AGREEMENT by and between the 32nd District Agricultural Association dba OC Fair & Event Center, hereinafter called the Association, and B & L Productions, Inc. hereinafter, called the Rentor

  • Analytics 1.1. IFS may track and analyze the usage of the IFS Offering for purposes of determining usage made of the IFS Offering, for the purposes of security, to assist customers, and for improving the Software and Services and the user experience in using such Software and Services. For example, IFS may use this information to help customers derive more value from the Software and Services, to understand and analyze trends, or to track which features are used most often in order to improve the Software and Services. IFS may share anonymous usage data with its service providers for the purpose of helping in such tracking, analysis and improvements. Additionally, IFS may share such anonymous usage data on an aggregate basis in the normal course of operating their business; for example, IFS may share information publicly to show trends about the general use of its software and services. TERMS - SERVICES

  • Development or Offering of Renewable Energy Sources Competitive Supplier agrees that it will comply with the applicable provisions of X.X.X. x. 00X, § 00X, § 00 F1/2, and any regulations, orders or policies adopted pursuant thereto.

  • NO HARDSTOP/PASSIVE LICENSE MONITORING Unless an Authorized User is otherwise specifically advised to the contrary in writing at the time of order and prior to purchase, Contractor hereby warrants and represents that the Product and all Upgrades do not and will not contain any computer code that would disable the Product or Upgrades or impair in any way its operation based on the elapsing of a period of time, exceeding an authorized number of copies, advancement to a particular date or other numeral, or other similar self-destruct mechanisms (sometimes referred to as “time bombs,” “time locks,” or “drop dead” devices) or that would permit Contractor to access the Product to cause such disablement or impairment (sometimes referred to as a “trap door” device). Contractor agrees that in the event of a breach or alleged breach of this provision that Authorized User shall not have an adequate remedy at law, including monetary damages, and that Authorized User shall consequently be entitled to seek a temporary restraining order, injunction, or other form of equitable relief against the continuance of such breach, in addition to any and all remedies to which Authorized User shall be entitled.

  • RDDS Registration Data Directory Services refers to the collective of WHOIS and Web-­‐based WHOIS services as defined in Specification 4 of this Agreement.

  • Network Etiquette You are expected to abide by the generally accepted rules of network etiquette. These include but are not limited to the following:

  • Joint Network Implementation and Grooming Process Upon request of either Party, the Parties shall jointly develop an implementation and grooming process (the “Joint Grooming Process” or “Joint Process”) which may define and detail, inter alia:

  • COVERED HEALTHCARE SERVICES This section describes covered healthcare services. This plan covers services only if they meet all of the following requirements: • Listed as a covered healthcare service in this section. The fact that a provider has prescribed or recommended a service, or that it is the only available treatment for an illness or injury does not mean it is a covered healthcare service under this plan. • Medically necessary, consistent with our medical policies and related guidelines at the time the services are provided. • Not listed in Exclusions Section. • Received while a member is enrolled in the plan. • Consistent with applicable state or federal law. We review medical necessity in accordance with our medical policies and related guidelines. Our medical policies can be found on our website. Our medical policies are written to help administer benefits for the purpose of claims payment. They are made available to you for informational purposes and are subject to change. Medical policies are not meant to be used as a guide for your medical treatment. Your medical treatment remains a decision made by you with your physician. If you have questions about our medical policies, please call Customer Service. When a new service or drug becomes available, when possible, we will review it within six (6) months of one of the events described below to determine whether the new service or drug will be covered: • the assignment of an American Medical Association (AMA) Current Procedural Terminology (CPT) code in the annual CPT publication; • final Food and Drug Administration (FDA) approval; • the assignment of processing codes other than CPT codes or approval by governing or regulatory bodies other than the FDA; • submission to us of a claim meeting the criteria above; and • generally, the first date an FDA approved prescription drug is available in pharmacies (for prescription drug coverage only). During the review period, new services and drugs are not covered. For all covered healthcare services, please see the Summary of Medical Benefits and the Summary of Pharmacy Benefits to determine the amount that you pay and any benefit limits.

  • Workstation Encryption Supplier will require hard disk encryption of at least 256-bit Advanced Encryption Standard (AES) on all workstations and/or laptops used by Personnel where such Personnel are accessing or processing Accenture Data.

  • SERVICE MONITORING, ANALYSES AND ORACLE SOFTWARE 11.1 We continuously monitor the Services to facilitate Oracle’s operation of the Services; to help resolve Your service requests; to detect and address threats to the functionality, security, integrity, and availability of the Services as well as any content, data, or applications in the Services; and to detect and address illegal acts or violations of the Acceptable Use Policy. Oracle monitoring tools do not collect or store any of Your Content residing in the Services, except as needed for such purposes. Oracle does not monitor, and does not address issues with, non-Oracle software provided by You or any of Your Users that is stored in, or run on or through, the Services. Information collected by Oracle monitoring tools (excluding Your Content) may also be used to assist in managing Oracle’s product and service portfolio, to help Oracle address deficiencies in its product and service offerings, and for license management purposes.

Time is Money Join Law Insider Premium to draft better contracts faster.