COMPUTER SOFTWARE RULES BASED

Brand Owner Address Description
ARRT-AUTOMATED, RULES BASED, REAL TIME TRANSACTIONS GROUP BENEFIT OPTIONS Two Corporate Drive, Suite 636 Shelton CT 06484 Computer software for the rules-based, automation of insurance related transactions that occur in real-time, namely, automated customer acquisition, product display and policy purchase, billing and delivery of insurance and personal protection products for consumers, distributors (agents) and insurance companies; Computer software for the automation of insurance related transactions, namely, the automated transmission of product eligibility and account data to consumers, distributors and insurance companies that may be downloaded from our computer network; Computer software platforms for the automation of insurance related transactions , namely, the automated storage and ability to instantaneously view, download and print purchased plan information and product materials for consumers, distributors (agents) and insurance companies;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.