COMPUTER SOFTWARE PROVIDING RISK

Brand Owner (click to sort) Address Description
CHIPS Mantara, Inc. 111 Town Square Pl, Ste 1500b Jersey City NJ 07310 Computer software for providing risk management solutions for financial markets;COMPREHENSIVE HIGH FREQUENCY PATROL SYSTEM;
CLEARVIEW CHICAGO MERCANTILE EXCHANGE INC. 20 S. Wacker Drive Chicago IL 60606 computer software for providing risk management information;CLEAR VIEW;
PROCESS TECHKNOWLEDGY NorthPoint Software Ventures Inc. Four California Avenue Framingham MA 017018867 computer software for providing risk assessment analysis of other computer software and software development programs and instructional manuals sold as a unit therewith;PROCESS TECHNOLOGY;
SI TECHKNOWLEDGY NorthPoint Software Ventures Inc. Four California Avenue Framingham MA 017018867 computer software for providing risk assessment analysis of other computer software and software development programs and instructional manuals sold as a unit therewith;
THE POWER OF INTEGRATION eIQnetworks, Inc. 35 Nagog Park, 1st Floor Acton MA 01720 Computer software for providing risk, security and compliance management to help customers gain insight into their overall risk, security and compliance posture featuring security information and event management functionality, namely, log management, reporting, monitoring, and forensics, as well as configuration management, asset management, vulnerability management, and performance management across heterogenous information technology infrastructures, networks, applications and server layers, to provide coorelated information technology risk management;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.