COMPUTER SOFTWARE TOOLS USED

Brand Owner (click to sort) Address Description
AQUANTY Aquanty Inc. Unit 2 564 Weber St. N. Waterloo ON N2L5C6 Canada Computer software tools used to analyze and manage the complex interplay between atmospheric water, surface water and groundwater and to solve the world's water resource problems;Consulting services with respect to the world's water resources in the field of water distribution and supply;
CELLOS MOTOROLA, INC. Chicago IL computer software tools used to create and build embedded operating systems for portable information devices; computer software, namely, operating systems for portable information devices; integrated circuits containing an embedded operating system;
DECISIONTREE AZAVEA INC. 340 N 12TH ST, SUITE 402 PHILADELPHIA PA 19107 Computer software tools used to apply geographic, spatial, statistical and scientific analysis and modeling techniques to decision-making processes;DECISION TREE;
FOR-STUDY COBALT BLUE, INC. Suite D-400 875 Old Roswell Road Roswell GA 30076 computer software tools used to analyze fortran code and decipher its contents;
INTEGRITY TEST Integrity QA Software, Inc. 1550 South Bascom Avenue Suite 380 Campbell CA 95008 computer software tools used to assure the quality of software and to locate errors in computer programs, and instructional manuals sold therewith;
TOOLS/4 COBOL AUTOMATION, INC. 100- 83rd Avenue NE Minneapolis MN 55432 computer software tools used to aid in the creation of computer software;Tools for Cobol;
TURNING IMAGINATION INTO REALITY SDP S.A. 8, ALLEE DE L'ANCIEN PONT 92150 Suresnes France computer software tools used to design and develop software for general business use;
YOU SEARCH SkyDeep 20801 Biscayne Blvd Suite 403 Aventura FL 33180 Computer software tools used for extracting, transforming, loading, querying, profiling, or visualizing data;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.