Inter-Tel AXXESS Manual page 1578

Hide thumbs Also See for AXXESS:
Table of Contents

Advertisement

Appendix G – Open Source License Agreements
®
®
INTER-TEL
AXXESS
THE LIBRARY (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING
RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR
A FAILURE OF THE LIBRARY TO OPERATE WITH ANY OTHER SOFTWARE), EVEN
IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.
END OF TERMS AND CONDITIONS
4. MD5
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as the "RSA Data
Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this
software or this function.
License is also granted to make and use derivative works provided that such works are identi-
fied as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all
material mentioning or referencing the derived work.
RSA Data Security, Inc. makes no representations concerning either the merchantability of this
software or the suitability of this software for any particular purpose. It is provided "as is"
without express or implied warranty of any kind.
These notices must be retained in any copies of any part of this documentation and/or software.
5. EMBEDDED CONFIGURABLE OPERATING SYSTEM
Part of the software embedded in this product is eCos—Embedded Configurable Operating
System—a trademark of Red Hat. Portions created by Red Hat are Copyright (C) 1998, 1999,
2000 Red Hat, Inc. (http://www.redhat.com/). All Rights Reserved. In Axxess, eCos is used n
the Call Processing Card (CPC) and Internet Protocol Resource Card (IPRC).
THE SOFTWARE IN THIS PRODUCT WAS IN PART PROVIDED BY RED HAT AND
ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTIC-
ULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR BE LIA-
BLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCURE-
MENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS;
OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
6. REQUESTS FOR SOURCE CODE
6.1
in paragraph 1.3 on
under the GNU General Public License or Lesser General Public License, email
quest@mitel.com.
Page G-14
MANUAL VERSION 11.0 – May 2008
Inter-Tel shall provide the source code to anyone requesting it for the licenses identified
page
G-2. To obtain the source code of third-party components licensed
gplre-
MD5

Advertisement

Table of Contents
loading

Table of Contents