COMPUTER BASED SOFTWARE HARDWARE

Brand Owner (click to sort) Address Description
CARECOM Informed, Inc. 1550 Tiburon Blvd Suite G - 312 Belvedere Tiburon CA 94920 Computer-based software and hardware for the health care sector, including Internet-based and other network-based goods and services;CARE COM;
HEALTHEUS Informed, Inc. 1550 Tiburon Blvd Suite G - 312 Belvedere Tiburon CA 94920 Computer-based software and hardware for the health care sector, including Internet-based and other network-based goods and services;
INSTA-CT MEDCAM U.S.A. INC. 4800 N. FEDERAL HWY. STE. 206-D BOCA RATON FL 33431 computer based software and hardware used in conjunction with computed tomography;
INSTA-PAN MEDCAM U.S.A. INC. 4800 N. FEDERAL HWY. STE. 206-D BOCA RATON FL 33431 computer based software and hardware used in conjunction with panographic radiography;
INSTA-RAY MEDCAM U.S.A. INC. 4800 N. FEDERAL HWY. STE. 206-D BOCA RATON FL 33431 computer based software and hardware used for taking X-rays in the dental or medical field;
INSTA-RAY MedCam U.S.A., Inc. 4800 North Federal Highway, Suite 206D Boca Raton FL 33431 computer based software and hardware used for taking X-rays in dental applications;INSTANT RAY;
INSTA-SCAN MEDCAM U.S.A. INC. 4800 N. FEDERAL HWY. STE. 206-D BOCA RATON FL 33431 computer based software and hardware used to transfer dental or medical X-rays;
INSTA-SEND MEDCAM U.S.A. INC. 4800 N. FEDERAL HWY. STE. 206-D BOCA RATON FL 33431 computer based software and hardware used to transmit images and data by electronic means from one location to another;
INSTA-VIEW MEDCAM U.S.A. INC. 4800 N. FEDERAL HWY. STE. 206-D BOCA RATON FL 33431 computer based software and hardware used in conjunction with a dental or medical workstation;
VALSPAR ONSITE SWIMC 101 W. Prospect Avenue Cleveland OH 44115 Computer based software and hardware for monitoring coating process for manufactured goods;VALSPAR ON SITE;ONSITE;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.