Infrastructure logic Clause Samples

Infrastructure logic. The logic of the Infrastructure, i.e. the way resources should interact to support special community applications, will be modified to support the notions of: • Regions: set of resources defining the interaction boundaries of such resources. A resource is activated in the context of a region and can only interact with the resources in the same region at that moment in time. For example, an UI belongs to one region; a query execution can only be demanded to the Search Services available in the same region of the User Interface at search-time. • Groups: set of resources bound together by particular application-oriented properties. Groups do not define any interaction boundaries between the resources they contain; a group is used to support actions on sets of resources. For example, an Index Service should be designed to run a query on a group of Index DSs, rather than on an explicit list of such DSs. The overall organization of the system can be notably simplified by this simple and natural notion. • API contracts: a Service implements an API whose contract establishes its method’s signatures and semantics. WSDL and Java Stub of the Services are available from the support site. • Sub-Services: Services implementing only a part of an API contract. The existence of sub-Services must be declared as an explicit dependency in the IS. Examples are: the embedded ResultSet of the ICM Index obeys only to a sub-part of the ResultSet Service contract, that of ResultSet access. As such, is a sub-ResultSet. • Moving from Repository Services to Repository Data Structures. Indeed, Repositories are not DRIVER Services, but rather Data Structures to be managed by a special Service, called Repository Management Service. The Service operates as a generic OAI-PMH Repository harvester, returning result sets of the harvesting results. It therefore operates independently of the Aggregation Service, which will deal with input/output ResultSets, and can be reused for other purposes by other Services.

Related to Infrastructure logic

  • Infrastructure Modification of the location and/or sizing of the infrastructure for the Project that does not materially change the functionality of the infrastructure.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Acquisition Services (i) Serve as the Company’s investment and financial advisor and provide relevant market research and economic and statistical data in connection with the Company’s assets and investment objectives and policies; (ii) Subject to Section 4 hereof and the investment objectives and policies of the Company: (a) locate, analyze and select potential investments; (b) structure and negotiate the terms and conditions of transactions pursuant to which investments in Properties, Loans and other Permitted Investments will be made; (c) acquire, originate and dispose of Properties, Loans and other Permitted Investments on behalf of the Company; (d) arrange for financing and refinancing and make other changes in the asset or capital structure of investments in Properties, Loans and other Permitted Investments; and (e) enter into leases, service contracts and other agreements for Properties, Loans and other Permitted Investments; (iii) Perform due diligence on prospective investments and create due diligence reports summarizing the results of such work; (iv) Prepare reports regarding prospective investments that include recommendations and supporting documentation necessary for the Directors to evaluate the proposed investments; (v) Obtain reports (which may be prepared by the Advisor or its Affiliates), where appropriate, concerning the value of contemplated investments of the Company; (vi) Deliver to or maintain on behalf of the Company copies of all appraisals obtained in connection with the Company’s investments; and (vii) Negotiate and execute approved investments and other transactions, including prepayments, maturities, workouts and other settlements of Loans and other Permitted Investments.

  • Critical Infrastructure Subcontracts For purposes of this Paragraph, the designated countries are China, Iran, North Korea, Russia, and any countries lawfully designated by the Governor as a threat to critical infrastructure. Pursuant to Section 113.002 of the Business and Commerce Code, Contractor shall not enter into a subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business and Commerce Code, in this state, other than access specifically allowed for product warranty and support purposes to any subcontractor unless (i) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is majority owned or controlled by citizens or governmental entities of a designated country; and (ii) neither the subcontractor nor its parent company, nor any affiliate of the subcontractor or its parent company, is headquartered in a designated country. Contractor will notify the System Agency before entering into any subcontract that will provide direct or remote access to or control of critical infrastructure, as defined by Section 113.001 of the Texas Business & Commerce Code, in this state.

  • Information Systems Acquisition Development and Maintenance a. Client Data – Client Data will only be used by State Street for the purposes specified in this Agreement.