COMPUTER SOFTWARE THAT INTERFACES

Brand Owner (click to sort) Address Description
APPLICATION BRIDGE Aspect Telecommunications 1730 Fox Drive San Jose CA 95131 computer software that interfaces a data system with a telephone switch;BRIDGE;
M-CONNECT Masstech Group Inc. 2 East Beaver Creek Richmond Hill L4B2N3 Canada Computer software that interfaces to non-linear editing software to provide archival and playback services;MASSTECH GROUP CONNECT;
SAFE TEXTING Internet Promise Group Suite 239 2390 Crenshaw Blvd Torrance CA 90501 Computer software that interfaces a smart phone with vehicle electronics, detects a vehicle in motion and if the vehicle is in motion, either disables the SMS feature of the phone, while in a moving vehicle, or alternatively provides a hands and eyes free SMS feature via the vehicle electronics;
SAVI Masstech Group Inc. 2 East Beaver Creek Richmond Hill L4B2N3 Canada Computer software that interfaces to non-linear editing software to provide archival and playback services;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.