COMPUTER SOFTWARE WRITING REPORTS

Brand Owner (click to sort) Address Description
CYBERQUERY Cyberscience Corporation 6334 South Racine Circle Centennial CO 80111 computer software for writing reports for use in the extraction, analysis and viewing or printing of information stored in commercial databases located on mini and micro computer systems or networks;CYBER-QUERY;
VCQ Cyberscience Corporation 6334 South Racine Circle Centennial CO 80111 computer software for writing reports for use in the extraction, analysis and viewing or printing of information stored in commercial databases on mini and micro computer systems or networks;
VISUAL CYBERQUERY Cyberscience Corporation 6334 South Racine Circle Centennial CO 80111 computer software for writing reports for use in the extraction, analysis and viewing or printing of information stored in commercial databases located on mini and micro computer systems or networks;VISUAL CYBER-QUERY;VISUAL;
VM:DB/REPORTER STERLING SOFTWARE, INC. 300 Crescent Court, Suite 1200 Dallas TX 75201 computer software for writing reports that enable programmers and end users to easily generate formatted reports for databases and printed instructional manuals, therefor, sold as a unit;VM DB REPORTER;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.