Reference Guide

unauthorized disclosure or use. Nutanix and its licensors reserve all rights,
including but not limited to ownership and intellectual property rights, not
expressly granted to You. Nutanix’s licensors are the intended third party
beneficiaries of this Agreement and have the express right to rely upon and
directly enforce the terms set forth herein. There are no implied licenses
granted by Nutanix under this Agreement. Except as expressly specified
above, You shall have no rights to the Software.
2
Use.
2.1
Limitation on Use
. You must not use the Software or Documentation
except as permitted by this Agreement. You must not:
(a) alter, decompile, disassemble, modify, unbundle or create any derivative
works of the Software, the underlying source code, or the Documentation
in any way, including without limitation customization, translation or
localization;
(b) port, emulate the functionality, reverse compile, reverse assemble, reverse
engineer, create derivative works, or otherwise reduce to human readable
form or attempt to separate any of the components of the Software or
derive the source code for the Software;
(c) copy, redistribute, encumber, sell, rent, lease, license, sublicense, or
otherwise transfer rights to the Software or Documentation, use the
Software for the benefit of any third party or on a hosted basis;
(d) remove or alter any trademark, logo, copyright or other proprietary
notices, legends, symbols or labels in the Software or Documentation or
any product in which the Software is embedded;
(e) disclose the results of testing, benchmarking or other performance or
evaluation information related to the Software or the product to any third
party without the prior written consent of Nutanix;
(f) access or use the Software or Documentation for any competitive purposes
(e.g. to gain competitive intelligence; to design or build a competitive
product or service, or a product providing features, functions or graphics
similar to those used or provided by Nutanix; to copy any features,
functions or graphics; or to monitor availability, performance or
functionality for competitive purposes);
(g) use any “locked” or key restricted feature, function or capability without
first purchasing the applicable license and obtaining a valid key, even if
such feature, function or capability is enabled without a key; or