COMPUTER HARDWARE SOFTWARE ALLOWING

Brand Owner (click to sort) Address Description
C-ALL MANARIS CORPORATION 1155 RENE-LEVESQUE WEST SUITE 2720 MONTREAL H3B 2KB Computer hardware and software allowing access control, location and movement tracking of tag carrying persons or a tagged asset, allowing the monitoring station/center to get real-time and/or historical information on the location and movement of all tagged personnel and/or equipment;CHIP ALL;
VELOCITY BOX LetsGoLearn, Inc. 705 Wellesley Avenue Kensington CA 94708 Computer hardware and software allowing users to optimize available network or internet bandwidth when using/running network or internet-based applications; Computer hardware and software allowing users to reduce their network or internet bandwidth usage when using network or internet based applications; Computer hardware and software allowing users with network or internet bandwidth limitations or congestion to use third party network or internet based applications that otherwise would require additional network or internet bandwidth;BOX;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. An integrated hardware and software monitoring system for a remote computer includes an event monitoring module loaded on the remote computer. The event monitoring module includes a hardware event detector that detects hardware events on the remote computer that may need attention, and a software service detector that detects status of software running on the remote computer to determine if any of the software has failed or is not operating properly, and to output a software event as a result thereof. The monitoring system also includes a data transmission system for performing a data transmission so as to notify a support specialist over a network connection of a hardware event or software event detected by the event monitoring module. The monitoring system further includes a graphical user interface provided on a display of the remote computer for allowing a user of the remote computer to make selections as to which software services and hardware events are to be detected.