Sentences with phrase «by using our technology under»

By using our technology under their own brand, app publishers can extend their user lifetime, increase time spent in app, and boost user lifetime value.

Not exact matches

These risks and uncertainties include, among others: the unfavorable outcome of litigation, including so - called «Paragraph IV» litigation and other patent litigation, related to any of our products or products using our proprietary technologies, which may lead to competition from generic drug manufacturers; data from clinical trials may be interpreted by the FDA in different ways than we interpret it; the FDA may not agree with our regulatory approval strategies or components of our filings for our products, including our clinical trial designs, conduct and methodologies and, for ALKS 5461, evidence of efficacy and adequacy of bridging to buprenorphine; clinical development activities may not be completed on time or at all; the results of our clinical development activities may not be positive, or predictive of real - world results or of results in subsequent clinical trials; regulatory submissions may not occur or be submitted in a timely manner; the company and its licensees may not be able to continue to successfully commercialize their products; there may be a reduction in payment rate or reimbursement for the company's products or an increase in the company's financial obligations to governmental payers; the FDA or regulatory authorities outside the U.S. may make adverse decisions regarding the company's products; the company's products may prove difficult to manufacture, be precluded from commercialization by the proprietary rights of third parties, or have unintended side effects, adverse reactions or incidents of misuse; and those risks and uncertainties described under the heading «Risk Factors» in the company's most recent Annual Report on Form 10 - K and in subsequent filings made by the company with the U.S. Securities and Exchange Commission («SEC»), which are available on the SEC's website at www.sec.gov.
Under her leadership, the company invested $ 15 billion in modernizing its electricity infrastructure, including spending on «smart» meters (which allow companies to monitor use remotely), auto - switching devices that allow employees to monitor usage and outages from a distance, and technology that helps the grid «self - heal» by rerouting electricity around a damaged power line.
He said that half of India's population is under the age of 26, and it's that generation «that will use these technologies» enabled by an Internet - connected society.
Wireless local access network (WLAN) technologies, usually marketed under the WiFi brand, are used across BlackBerry devices and by most other smartphones.
«Consortium» Tackles «Criminal Use Of Dark Web» Sponsored by the Austrian Institute of Technology GmbH (AIT) under the auspices of the European Commission, a fifteen - strong «consortium» made up of seven EU member states will look at how to «prevent criminal use of the dark web and virtual currencies.&raqUse Of Dark Web» Sponsored by the Austrian Institute of Technology GmbH (AIT) under the auspices of the European Commission, a fifteen - strong «consortium» made up of seven EU member states will look at how to «prevent criminal use of the dark web and virtual currencies.&raquse of the dark web and virtual currencies.»
The climax of the democratization of work has come about through machine technology, under which machines are used to perform most of what was formerly done by slaves, and much more besides.
«The program, under the Green Revolution made use of high - yielding varieties (HYVs) developed by IRRI, and introduced a package of technology with seeds, chemical inputs and loans,» said Panerio.
Cell fusion technology is used to hybridize plants by removing cell walls from two cells of different species, usually those that would not normally breed under natural conditions, and then merging their contents.
However, the shelf life can be extended by using appropriate packaging technology, i.e. packing the powder under an inert gas such as N2.
You shall not Post Content that: (1) infringes any proprietary rights of any third party; (2) violates any law or regulation; (3) is defamatory or trade libelous; (4) is harmful, threatening, abusive, harassing, defamatory, vulgar, obscene, intimidating, profane, pornographic, hateful, racially, ethnically or sexually discriminatory or otherwise objectionable in any way or that otherwise violates any right of another; (5) encourages conduct that would violate any conduct prohibited by this Agreement; (6) restricts or inhibits any other user from using the Website; (7) is or amounts to an unsolicited advertisement, promotion, or other form of solicitation; (8) impersonates any person or entity or that directly or indirectly attempts to gain unauthorized access to any portion of the Website or any computer, software, or data of any person, organization or entity that uses or accesses the Website; (9) provides or create links to external sites that violate the Agreement; (10) is intended to harm, exploit, solicit, or collect personally identifiable information of, any individual under the age of 18 («Minor») in any way; (11) invades anyone's privacy by attempting to harvest, collect, store, or publish private or personally identifiable information without their foreknowledge and willing consent or distributes or contains viruses or any other technologies that may harm the Website or any of its users; (12) is copyrighted, protected by trade secret or otherwise subject to third - party proprietary rights, including privacy and publicity rights, unless you are the owner of such rights or have permission from the rightful owner to post the material and to grant Non-GMO Project all of the license rights granted herein; and / or (13) contains or promotes an illegal or unauthorized copy of another person's copyrighted work.
Under our roof, those hopes are answered every day — by physicians, nurses, and specialists using the latest technology, innovative research, and a collaborative, family - centered approach.
Notwithstanding any other provision of this section or any provision of sections 191 and 192, the Electoral Commission may proceed to select the names of those candidates entitled to be elected from lists submitted under section 127, by such method and procedure as the Electoral Commission thinks fit, including the use of computer technology:
The repeal of this section § 1226 of the VTL enabling hands free applications - something already undertaken by the other forty - nine states — allows New York State to make up the ground it has lost in the exploration and use of these new technologies authorized under this demonstration project.
ZOTEN nanoparticles were synthesized using technology developed by material scientists at Germany's Kiel University and protected under a joint patent with UIC.
This research has also made use of the Exoplanet Follow - up Observation Program website, which is operated by the California Institute of Technology, under contract with the National Aeronautics and Space Administration under the Exoplanet Exploration Program.
This research has made use of the NASA Exoplanet Archive, which is operated by the California Institute of Technology, under contract with the National Aeronautics and Space Administration under the Exoplanet Exploration Program.
The Delta VP30 technology has been approved by the National Institutes of Health for use under Biosafety Level 2 conditions and has been utilized safely for a decade to study the basic biology of the virus, identify potential antiviral compound candidates, and make the whole - virus vaccine.
The use of the Vivos technologies by any patient must always occur under the direction and supervision of a qualified, trained, and licensed dentist, physician or other qualified health provider, working in close collaboration with qualified medical personnel.
Under this brand, the lightest eyewear in the world is produced in Austria with a great love of detail, crafted mostly by hand in an individualized design using only the best materials and state - of - the - art technologies.
As reflected by the recent controversy of child pornography involving under - aged students in at least 70 public and private schools throughout Australia, the increased rate at which the use, and misuse, of technology in schools has generated a multitude of new legal issues surrounding the use of social and other digital media that most could not have anticipated a few short years ago.
Indeed, we can reconstruct a school of the past that is appropriate to the modern era, where teachers» salaries are competitive with other professions, where students are taught by older peers under the supervision of master teachers who can use technology for pedagogical purposes.
The top 6 technologies that are either under development or already in use in the flipped learning environment, as seen by our education professionals
HB 728 by Rep. Bobby Guerra / Sen. Juan Hinojosa requires the SBOE to develop an advanced computer science program under which students in participating school districts can meet an advanced math or science credit by completing an advanced computer science course focused on the creation and use of software and computing technologies.
The Workers» Compensation Information System (WCIS) is the Department of Transportation (DOT) Information Technology system used to manage the Department's workers» compensation program by providing features and functions to allow authorized personnel to transmit workers» compensation claims and to monitor the status of workers» compensation cases established with the United States Department of Labor (DOL) under the Federal Employee Compensation Act (FECA).
Mazda and Toyota recently reached an agreement on the supply by Toyota under license to Mazda of the hybrid system technology used in the Toyota Prius.
Ford Performance Parts Black Lug Nuts use Physical Vapor Deposition technology (PVD) which provides a scratch and wear resistance finish that ensures a perfect look for an extended period of time under intense use and provides surface wear resistance that can not be provided by electroplating, anodizing or lacquer.
Currently still under development, the new technology being worked on by Jaguar Land Rover uses sensors that are built into the door handles and the edges of the car doors.
Under the long bonnet is the 2.0 - litre variable - compression turbocharged engine from the QX50, backed in this case by the same ProPilot semi-autonomous driving technology already put to use in the latest Nissan Leaf.
This system, developed to production standard by a development consortium under the leadership of BMW offers a standard of data transfer capacity never seen before - and BMW is the first carmaker in the world to use FlexRay technology in a regular production car.
Although the Amazon warranty is voided by Waterfi implementing their waterproofing technology you can take solace in your investment because Waterfi offers a two year warranty against defects in materials and workmanship, under normal use.
Only a person licensed under sections sixty - seven hundred eleven and sixty - seven hundred eleven - a of this article or exempted from its provisions by section sixty - seven hundred twelve shall practice veterinary technology or use the title «veterinary technician».
Under no circumstances will the sites or the Chopra parties be liable to you for any loss or damages of any kind that are directly or indirectly related to the sites, the materials in the sites, the downloadable items, user content, your use or inability to use, or the performance of the sites, any action taken in connection with an investigation by the sites or law enforcement authorities regarding your use of the sites, and action taken in connection with copyright or other intellectual property owners, any errors or omission in the sites, technical operation, or any damage to any users computer, hardware, software, wireless devices, cellular phone, modem or other equipment or technology, including without limitation damage from any security breach or from any virus, bugs, tampering, fraud, scam, error, omission, interruption, defect, delay in operation or transmission, computer line or network failure or any other technical or other malfunction, even if foreseeable or even if the sites or Chopra parties have been advised of or should have known of the possibility of such damages, whether in an action of contract, negligence, strict liability or tort.
AIKELIDA ® RFID Blocking Travel Wallet - Money Belt & Passport Holder greatly reduce the risk of ever losing any travel essentials again ✔ Double stitched for maximum security ✔ Used by thousands of Amazon travelers ✔ These Travel Money Belts Make Ideal Gifts ✔ Discreet wallet hidden under the darkest of clothes ✔ Moisture wicking fabric at back for ultimate comfort ✔ Made with premium quality tough non-rip, water resistant fabric ✔ Stylishly designed and lightweight for maximum comfort on all shapes and sizes ✔ Specially designed to fit US passports, all bank notes travel tickets and iPhone 6S Secure Protection: Multi-layered lining with latest RFID blocking technology safely protects you from identity thieves & high tech pickpockets.
Under this brand, the lightest eyewear in the world is produced in Austria with a great love of detail, crafted mostly by hand in an individualized design using only the best materials and state - of - the - art technologies.
You agree not to engage in any of the following prohibited activities: (i) copying, distributing, or disclosing any part of the Service in any medium, including without limitation by any automated or non-automated «scraping»; (ii) using any automated system, including without limitation «robots,» «spiders,» «offline readers,» etc., to access the Service in a manner that sends more request messages to the Company servers than a human can reasonably produce in the same period of time by using a conventional on - line web browser (except that Humble Bundle grants the operators of public search engines revocable permission to use spiders to copy materials from Humble Bundle for the sole purpose of and solely to the extent necessary for creating publicly available searchable indices of the materials, but not caches or archives of such materials); (iii) transmitting spam, chain letters, or other unsolicited email; (iv) attempting to interfere with, compromise the system integrity or security or decipher any transmissions to or from the servers running the Service; (v) taking any action that imposes, or may impose in our sole judgment an unreasonable or disproportionately large load on our infrastructure; (vi) uploading invalid data, viruses, worms, or other software agents through the Service; (vii) collecting or harvesting any personally identifiable information, including account names, from the Service; (viii) using the Service for any commercial solicitation purposes; (ix) impersonating another person or otherwise misrepresenting your affiliation with a person or entity, conducting fraud, hiding or attempting to hide your identity; (x) interfering with the proper working of the Service; (xi) accessing any content on the Service through any technology or means other than those provided or authorized by the Service; (xii) bypassing the measures we may use to prevent or restrict access to the Service, including without limitation features that prevent or restrict use or copying of any content or enforce limitations on use of the Service or the content therein; (xiii) sell, assign, rent, lease, act as a service bureau, or grant rights in the Products, including, without limitation, through sublicense, to any other entity without the prior written consent of such Products» (defined below) licensors; (xiv) circumventing Service limitations on the number of Products you may purchase, including, without limitation, creating multiple accounts and purchasing a total number of Products through such multiple accounts which exceed the per - user limitations; or (xv) except as otherwise specifically set forth in a licensor's end user license agreement, as otherwise agreed upon by a licensor in writing or as otherwise allowed under applicable law, distributing, transmitting, copying (other than re-installing software or files previously purchased by you through the Service on computers, mobile or tablet devices owned by you, or creating backup copies of such software or files for your own personal use) or otherwise exploiting the Products (defined below) in any manner other than for your own private, non-commercial, personal use.
This analytical report describes how United Nations organizations use the information provided by space - based technologies to monitor the Earth's climate system and support decision - making about climate change adaptation, prediction and mitigation, including addressing the needs identified under the United Nations Framework Convention on Climate Change (UNFCCC).
Shukla and IGES fell under congressional investigation as a government - funded tax - exempt organization for violating non-profit law with «partisan political activity» by requesting the use of RICO against companies and organizations «that disagree with the Obama administration on climate change,» according to the House Science, Space and Technology committee.
In a joint statement released by U.S. President Obama and Indian Prime Minister Modi, recognizing, «the need to use the institutions and expertise of the Montreal Protocol to reduce consumption and production of HFCs, while continuing to report and account for the quantities reduced under the UNFCCC», the two countries «pledged to urgently arrange a meeting of their bilateral task force on HFCs prior to the next meeting of the Montreal Protocol to discuss issues such as safety, cost, and commercial access to new or alternative technologies to replace HFCs.»
«The «regulate CO2» push will focus «inside the fence» on existing plants by trying to force the use of very expensive technology, but CO2 is a benign gas required for life on Earth, so there would be no commensurate environmental improvement under any CO2 regulatory regime.»
The mobile app Seeds The Game, currently under development, could help shift the way we use mobile technology, by combining gaming, social interactions, and a virtual learning environment, and bridging the divide between the digital and physical worlds.
Filed Under: Gadgets, Mobility Tagged With: lawyers using mobile technology, legal experts, tablet and smartphone, tablet used by attorneys
«We believe that by using decentralised technology to connect latent resources on the supply side (under - utilised lawyers) with newly discovered resources on the demand side (donations that were never aimed at the legal industry) we can change the access to justice paradigm,» Ghiassi said.
Aerospike, a NoSQL startup that has garnered a fair number of advertising industry customers thanks to its in - memory technology, has raised $ 20 million in a series C round and is open sourcing its database under the same license used by MongoDB.
Under ideal conditions, companies that do bad things with technology are shamed and embarrassed by bad press (norms); they face lawsuits and regulatory action (law); they lose customers and their share - price dips (markets); and then toolsmiths make add - ons for their product that allow us all to use them safely, without giving up our personal information, or being locked into their software store, or having to get repairs or consumables from the manufacturer at any price (code).
This new technology, being christened as «Vivo Under Display» will allow users to unlock the smartphone by using fingerprint technology, but without a fingerprint sensor embedded on a physical button.
Universities would better serve the public interest by ensuring appropriate use of their technology by requiring their licensees to operate under a business model that encourages commercialization and does not rely primarily on threats of infringement litigation to generate revenue.
Under this brand, the lightest eyewear in the world is produced in Austria with a great love of detail, crafted mostly by hand in an individualized design using only the best materials and state - of - the - art technologies.
To unravel the mystery of what happens to your resume under these circumstances, Ladders spoke with Matt Sigelman, CEO of Burning Glass, in Boston, which produces resume - processing and data - extraction technologies used by HR departments and recruiters to sort candidates.
• Coordinated effort between Development, QA, Production, DR, System, DBA, Production - support, Network Administration, Applications group and vendors for project completion ahead of schedule under budget • Incorporated new technologies with legacy systems to improve performance and reduce cost • Experienced in incorporating leading open source tools: nagios, mysql, tomcat, apache, wikis, etc. • Performed broad range of UNIX Systems, Net - Working and SAN Administration tasks for large financial and networking clients such as HSBC Bank USA, Deutsche Bank, Citi Group, ISO.com, GE Corporate Treasury, Globeop Financial Services, LLC., Sothebys.com, Church Pension Group, and Verizon Partners Solutions • Provided project leadership for managing technical resources, client / server issues, vendors, senior management reviews and hands - on technical expertise • Designed and deployed iPlanet Web / Directory server Architecture for the purpose of authentication and Widows 2000 active Directory compatibility • Prepared estimates and diagrams for the new secured Development Environment comprised of Cisco routers, local directors, hubs, Sun servers, firewalls for deployment, staging and production • Developed one to one disaster recovery using Bourne Shell scripting for Reuters» Kondor 3.0 on Solaris 8 • Minimized website down time through careful monitoring of Sotheby's Web Vision to Amazon by using FTP servers to manage high volume uploads which optimized online trading functionalities • Directed installation, configuration, and security of multiple online global auction sites • Automated operations, disk space monitoring, and backups using Bourne and Korn Shell scripting • Developed standard operating procedure for IP multi-pathing, Emulex LPFC, HBAs, EMC Power path, Navisphere, and installed JASS on new built servers
a b c d e f g h i j k l m n o p q r s t u v w x y z