Use with Virtualization Technologies Sample Clauses

The "Use with Virtualization Technologies" clause defines the terms under which licensed software may be deployed or operated within virtualized environments, such as virtual machines or containers. It typically clarifies whether the license permits installation on virtual servers, how usage counts are determined in such settings, and any restrictions or additional requirements that apply when using virtualization platforms. This clause ensures that both licensors and licensees understand how software licensing is affected by virtualization, preventing disputes over unauthorized use and aligning the agreement with modern IT practices.
POPULAR SAMPLE Copied 1 times
Use with Virtualization Technologies. You may not use the software installed on the licensed computer within a virtual (or other emulated) hardware system.
Use with Virtualization Technologies. Instead of using the software directly on the licensed computer, you may install and use the software within only one virtual (or otherwise emulated) hardware system on the licensed computer. When used in a virtualized environment, content protected by digital rights management technology, BitLocker or any full volume disk drive encryption technology may not be as secure as protected content not in a virtualized environment. You should comply with all domestic and international laws that apply to such protected content.
Use with Virtualization Technologies. Instead of using the software directly on the licensed device, you may install and use the software within only one virtual (or otherwise emulated) hardware system on the licensed device.
Use with Virtualization Technologies. You may use the Software on a virtual (or otherwise emulated) Terminal which is an instance of a Primary Terminal (each a “Guest Terminal”). If You do so, then You must purchase licenses for each Guest Terminal on which the Software is installed and used in addition to the licenses for the Primary Terminal on which the Software installed and used.
Use with Virtualization Technologies. Instead of using the software directly on the licensed device, you may install and use a copy within a virtual (or otherwise emulated) hardware system on the licensed device. When used in this manner, protected content may not be as secure as when used directly on the licensed device. (Protected content is content that is protected by digital rights management technology, BitLocker or any full volume disk drive encryption technology.) You should comply with all domestic and international laws that apply to protected content you play or access.
Use with Virtualization Technologies. You may use the software installed on the licensed device within a virtual (or otherwise emulated) hardware system on the licensed device. If you do so, you may not play or access content or use applications protected by any Microsoft digital, information or enterprise rights management technology or other Microsoft rights management services or use BitLocker. We advise against playing or accessing content or using applications protected by other digital, information or enterprise rights management technology or other rights management services or using full volume disk drive encryption.
Use with Virtualization Technologies. You may not use the software installed on the licensed device within a virtual (or otherwise emulated) hardware system. WINDOWS VISTA HOME PREMIUM ADDITIONAL LICENSE TERMS. The following additional license terms apply to Windows Vista Home Premium.

Related to Use with Virtualization Technologies

  • Information Technology The following applies to all contracts for information technology commodities and contractual services. “Information technology” is defined in section 287.012(15), F.S., to have the same meaning as provided in section 282.0041, F.S.

  • Information Technology Accessibility Standards Any information technology related products or services purchased, used or maintained through this Grant must be compatible with the principles and goals contained in the Electronic and Information Technology Accessibility Standards adopted by the Architectural and Transportation Barriers Compliance Board under Section 508 of the federal Rehabilitation Act of 1973 (29 U.S.C. §794d), as amended. The federal Electronic and Information Technology Accessibility Standards can be found at: ▇▇▇▇://▇▇▇.▇▇▇▇▇▇-▇▇▇▇▇.▇▇▇/508.htm.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • Information Technology Enterprise Architecture Requirements If this Contract involves information technology-related products or services, the Contractor agrees that all such products or services are compatible with any of the technology standards found at ▇▇▇▇▇://▇▇▇.▇▇.▇▇▇/iot/2394.htm that are applicable, including the assistive technology standard. The State may terminate this Contract for default if the terms of this paragraph are breached.

  • Technology Discoveries, innovations, Know-How and inventions, whether patentable or not, including computer software, recognized under U.S. law as intellectual creations to which rights of ownership accrue, including, but not limited to, patents, trade secrets, maskworks and copyrights developed under this Agreement.