COMPUTER PROGRAMS PROVIDING NETWORK

Brand Owner (click to sort) Address Description
MADMANAGER Xedia Corporation 119 Russell Steet Littleton MA 014601274 computer programs for providing network management of real time networks;MAD MANAGER;
SAINT Richard S. Carson & Associates, Inc. 4720 Montgomery Lane, Suite 800 Bethesda MD 208143444 Computer Programs for Providing Network Security Tests and Security Information, and Computer Programs for Producing Security Assessment Reports;Computer Network Security Services, Namely, Providing Network Security Tests and Security Information, and updating of Computer Software;
SAINTSCANNER Richard S. Carson & Associates, Inc. 4720 Montgomery Lane, Suite 800 Bethesda MD 208143444 Computer programs for Providing Network Security Tests and Security Information, and for Producing Security Assessment Reports;SAINT SCANNER;
SAINTSTICK Richard S. Carson & Associates, Inc. 4720 Montgomery Lane, Suite 800 Bethesda MD 208143444 Computer programs for providing network security tests and security information, and computer programs for producing security assessment reports;SAINT STICK;
SMARTUJ KABUSHIKI KAISHA TOSHIBA 1-1, Shibaura 1-chome, Minato-ku Tokyo 105-8001 Japan computer programs for providing network security, Internet security, and computer security;SMART UJ;Providing temporary use of non-downloadable computer software for providing network security, Internet security, and computer security, via computer network;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system includes various security measures to insure that semi-permanent operating programs, such a boot blocks and firmware, are updated properly. For example, the system may include a security switch that can enable a host computer to load a replacement program into another computer, such as an appliance server for example, if the other computer fails. Also, if a replacement program is being loaded over a network connection that fails, the loading can resume automatically after re-establishment of the network connection. In addition, certain programs, such as boot blocks, may be verified in an execution memory, such as RAM, and loaded into a more permanent storage memory, such as ROM, only if verified.