COMPUTER SOFTWARE GENERATING RISK

Brand Owner (click to sort) Address Description
SUITABILITYPRO Morningstar, Inc. 22 W. WASHINGTON STREET CHICAGO IL 60602 Computer software for generating risk profiles for individuals; Computer software for generating financial plans for individuals; Computer software for monitoring the implementation of financial plans for individuals, and for recommending strategies based on the risk profile of the individual;SUITABILITY PRO;Personalized investment counselling; personalized risk assessment services;Software as a service (SAAS) services featuring software for generating risk profiles for individuals; Software as a service (SAAS) services featuring software for generating financial plans for individuals; Software as a service (SAAS) services featuring software for monitoring the implementation of financial plans for individuals and the performance of financial products, namely, investments, insurance, and loans, and for providing notifications and recommendations based on an analysis of monitored implementation and performance;
SUITABILITYPRO PlanPlus Global Inc. 55 Mary Street, Suite 200 Lindsay, Ontario K9V5Z6 Canada Computer software for generating risk profiles for individuals; Computer software for generating financial plans for individuals; Computer software for monitoring the implementation of financial plans for individuals, and for recommending strategies based on the risk profile of the individual;SUITABILITY PRO;Personalized investment counselling; personalized risk assessment services;Software as a service (SAAS) services featuring software for generating risk profiles for individuals; Software as a service (SAAS) services featuring software for generating financial plans for individuals; Software as a service (SAAS) services featuring software for monitoring the implementation of financial plans for individuals and the performance of financial products, namely, investments, insurance, and loans, and for providing notifications and recommendations based on an analysis of monitored implementation and performance;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.