d. Remote Access Technologies.
You may access and use the software remotely from another
device using remote access technologies as follows.
Remote Desktop.
The single primary user of the device may access a session from any other device
using Remote Desktop or similar technologies. A “session” means the experience of interacting with
the software, directly or indirectly, through any combination of input, output and display peripherals.
Other users may access a session from any device using these technologies, if the remote device is
separately licensed to run the software.
Other Access Technologies. You may use Remote Assistance or similar technologies to share an
active session.
Other Remote Uses. You may allow any number of devices to access the software for purposes
other than those described in the Device Connections and Remote Access Technologies sections
above, such as to synchronize data between devices.
e. Font Components.
While the software is running, you may use its fonts to display and print
content. You may only
• embed fonts in content as permitted by the embedding restrictions in the fonts; and
• temporarily download them to a printer or other output device to print content.
f. Icons, images and sounds.
While the software is running, you may use but not share its icons,
images, sounds, and media.
3. VHD BOOT.
Additional copies of the software created using the software’s Virtual Hard Disk
functionality (“VHD Image”) may be pre-installed on the physical hard disk of the device. These VHD
Images may only be used for maintaining or updating the software installed on the physical hard disk
or drive. If the VHD Image is the only software on your device, it may be used as the primary operating
system but all other copies of the VHD Image may only be used for maintenance and updating.
4. POTENTIALLY UNWANTED SOFTWARE.
The software may include Windows Defender. If Windows
Defender is turned on, it will search this device for “spyware,” “adware” and other potentially unwanted
software. If it finds potentially unwanted software, the software will ask you if you want to ignore,
disable (quarantine) or remove it. Any potentially unwanted software rated “high” or “severe,” will be
automatically removed after scanning unless you change the default setting. Removing or disabling
potentially unwanted software may result in
• Other software on your device ceasing to work, or
• Your breaching a license to use other software on this device
By using this software , it is possible that you will also remove or disable software that is not potentially
unwanted software.
5. SCOPE OF LICENSE.
The software is licensed, not sold. This agreement only gives you some rights
to use the software. NBGI and Microsoft reserve all other rights. Unless applicable law gives you more
rights despite this limitation, you may use the software only as expressly permitted in this agreement.
In doing so, you must comply with any technical limitations in the software that allow you to use it only
in certain ways. For more information, see the software documentation or contact NBGI. You may not:
• work around any technical limitations in the software;
• reverse engineer, decompile or disassemble the software;
• make more copies of the software than specified in this agreement;
• publish the software for others to copy;
• rent, lease or lend the software; or
• use the software for commercial software hosting services.
Except as expressly provided in this agreement, rights to access the software on this device do not
give you any right to implement Microsoft patents or other Microsoft intellectual property in software or
devices that access this device.
Содержание MACH STORM
Страница 8: ...6 1 Safety Precautions Be sure to read to ensure safe operation Projector unit LVP FD630 V1 ...
Страница 198: ......