Database Servers Clause Samples

The 'Database Servers' clause defines the requirements and responsibilities related to the use, management, and maintenance of database servers within the scope of an agreement. It typically specifies which party is responsible for providing, securing, and supporting the database infrastructure, and may outline standards for data backup, access controls, and performance. By clearly allocating duties and expectations regarding database servers, this clause helps prevent disputes over data management and ensures that critical information systems are properly maintained and protected.
Database Servers. Database servers will be monitored by continuous pinging to make sure the machine is alive. Disk space on the database servers will be monitored and someone notified if capacity exceeds a preset level. Database table space and database extents allocated will be monitored and web operations notified if capacity exceeds a preset level.
Database Servers. 1.4.1.1.1. mySQL 1.4.1.1.2. SQL Server 1.
Database Servers. For Microsoft Windows we support Microsoft SQL Server 7 and SQL 2000 database products. On the Sun Solaris platform we support Oracle 8i and have begun work on Oracle 9i. Additionally, we provide High Availability database solutions on both platforms: SQL 2000 Dynamic Failover for Windows, and Oracle 8i Dynamic Failover for Solaris. Application Servers and Commerce Suites. Our primary commerce products on Windows are Microsoft Site Server Commerce Edition for NT4 and Microsoft Commerce 2000 for Windows 2000. On the Sun Solaris platform we support iPlanet Application Server 6.0. Support for both BEA Weblogic ATG Dynamo, and IBM Websphere applications is provided. Given the large number of commerce products, we carefully select those that have a solid market share advantage and technical superiority. We will continue to add products to this list as market opportunities dictate. CONSULTING SERVICES Our consulting services provide customized assistance to customers with unique architecture, deployment or maintenance requirements. These services include high-availability design, performance tuning, site architecture assessment, migration planning, capacity planning, and database optimization. Our consulting services typically assist customers with limited resources or who lack Internet and technical expertise. Our consulting engagements typically range from a few hours to a few weeks depending on the complexity and volume of the services needed. We believe our consulting services will play an increasingly important role in supporting the implementation and maintenance of complex Web sites and Web-based applications.
Database Servers. The database/repository provides all the relevant information required to process the applications. Database server would be required to store and access data with ease. This would also be integrated with multiple applications, residing at the DC.
Database Servers. This document does not address information on database component failure because those scenarios are addressed as database recovery actions rather than disaster recovery. Database backups are kept for disaster recovery purposes, and are to be used to recover the entire database in the event of a failure. These backups are not intended to be used to recover specific data for an institution. However standard database backup and recovery practices that include a combination of frequent database backups and full recovery models utilizing Transaction logs are being used as part of a comprehensive database recoverability strategy. Based on past history, failure events such as these may be most likely to occur due to:
Database Servers 

Related to Database Servers

  • Server Software Subject to the terms and conditions of this ▇▇▇▇, Vocera grants you the non-exclusive right to (i) install and run (“Use”) the Server Software on computer systems (each, a “Server Computer”) located at End User’s Facilities in the geographic territory designated above (“Territory”); (ii) to Use the Client Software in conjunction with Authorized Client Devices and such Server Computers; and (iii) for pilot licenses for certain Software provided on a trial basis, use such Software for the limited term specified by Vocera in writing. You may Use the standard Server Software on one primary Server Computer (or a primary cluster of computers suitably configured for productive use of the Server Software). You may install backup copies of the Server Software on backup Server Computers to provide redundancy in the event of failure of the primary Server Computer(s) but, unless you have acquired additional licenses or a failover license from Vocera, you may not run such backup or additional copies concurrently with the primary copies. Vocera grants you the right to use the applicable License Key issued by Vocera only to enable Use of the Server Software in conjunction with the licensed Server Computers. Server Software may be licensed for a Subscription Term as specified in the Quote.

  • Database The LERG is available through Telcordia. ICONN is available through the Qwest web site.

  • Web Site Information on registration for and use of the E-Verify program can be obtained via the Internet at the Department of Homeland Security Web site: ▇▇▇▇://▇▇▇.▇▇▇.▇▇▇/E-Verify.

  • Internet Use 7.1. Customer is prohibited from posting or transmitting unlawful material on or via the Internet or the World Wide Web. 7.2. Leaseweb is entitled to actively block ports or IP addresses for the Network, in the event that such is – in Leaseweb’s reasonable view – necessary to preserve or protect the security and performance of the Network or the Internet or the World Wide Web. An overview of the blocked ports or IP addresses may be requested in writing by Customer from Leaseweb. 7.3. Without prejudice to the generality of Clause 7.2 of the Acceptable Use Policy, Leaseweb shall in any event actively block the following ports for its Network: (i) UDP/137 – Netbios; (ii) UDP/139 – Netbios; (iii) TCP/135 till 139 – Netbios;(iv) TCP/445 – Smb; and (v) Protocol UDP port 11211 - Memcache 7.4. If Leaseweb reasonably suspects that Customer is subject to a DoS attack, DDoS attack, DRDoS attack or another attack and (in Leaseweb’s reasonable opinion) such attack negatively affects the Infrastructure, Leaseweb shall be entitled to immediately block access to Customer's Infrastructure. In the event that Customer is subject to repetitive attacks, and Customer does not successfully take measures to prevent that future attacks may negatively affect Leaseweb’s Infrastructure, then Leaseweb shall be entitled to immediately terminate theSales Contract by sending a written notice to Customer.

  • Architecture The Private Improvements shall have architectural features, detailing, and design elements in accordance with the Project Schematic Drawings. All accessory screening walls or fences, if necessary, shall use similar primary material, color, and detailing as on the Private Improvements.