COMPUTER SOFTWARE THAT INTERFACES WITH

Brand Owner (click to sort) Address Description
CATAPULTDMD TouchPoint Solutions, Inc. 12480 West Atlantic Blvd Suite #2 Coral Springs FL 33071 Computer software that interfaces with a computer operating system to allow secure deployment, proactive management, and remediation of remote devices;
GUIDEWARE GUIDEWARE SYSTEMS P.O. Box 721087 SANTA BARBARA CA 95172 COMPUTER SOFTWARE THAT INTERFACES WITH GAS ANALYZERS, AND TRACKS AND REPORTS ON MEASUREMENTS OF FUGITIVE EMISSION LEAKS AND RELATED REPAIRS FOR USE IN THE FIELD OF LEAK DETECTION AND REPAIR IN INDUSTRIES THAT USE VOLATILE ORGANIC COMPOUNDS;GUIDE WARE;
INTERNET OF MANUFACTURING Fusiform, Inc. 5000 Thayer Center, Suite C Oakland MD 21550 Computer software that interfaces with image-guided equipment and to manage the processing of data used in connection with image-guided equipment;
IOM Fusiform, Inc. 5000 Thayer Center, Suite C Oakland MD 21550 Computer software that interfaces with image-guided equipment and manages the processing of data used in connection with image-guided equipment;
WEBIFYER uRoam, Inc. 4047 Clipper Court Fremont CA 94538 Computer software that interfaces with existing computer applications, programs and operating systems to make such applications, programs and operating systems remotely accessible via a global computer network using a variety of access devices; and manuals supplied with the foregoing.;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.