COMPUTER SOFTWARE ACCESSED OVER

Brand Owner (click to sort) Address Description
PEACHTREE WEBSITECREATOR SAGE SOFTWARE, INC. 6561 Irvine Center Drive Irvine CA 92618 Computer software accessed over a global computer network and used for creating a website;WEBSITECREATOR;Providing temporary use of non-downloadable software for use in creating a website; hosting the websites for others on a computer server for a global computer network;
PEACHTREE WEBSITETRADER SAGE SOFTWARE, INC. 6561 Irvine Center Drive Irvine CA 92618 Computer software accessed over a global computer network and used for enabling a website to function as an e-commerce site; computer software accessed over a global computer network and used for integrating online sales with accounting software;WEBSITETRADER;Providing temporary use of non-downloadable software for use in enabling a website to function as an e-commerce site; providing temporary use of non-downloadable software for use in the integration of online sales activity with accounting software;
WEBSITECREATOR PRO SAGE SOFTWARE, INC. 6561 Irvine Center Drive Irvine CA 92618 Computer software accessed over a global computer network used for creating a website;WEBSITE CREATOR PRO;WEBSITE CREATOR;Computer services, namely, providing non-downloadable software used for creating a website and providing website hosting services;
WEBSITECREATORPRO PEACHTREE SOFTWARE, INC. 1505 Pavilion Place Norcross GA 30093 Computer software accessed over a global computer network used for creating a web site;Computer services, namely, providing non-downloadable software used for creating a website and providing website hosting services;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.