COMPUTER SOFTWARE DEFINING

Brand Owner (click to sort) Address Description
ANTENNA DESIGNER PDS ELECTRONICS, INC. P.O. Box 909 Akron OH 44309 Computer software for defining and analyzing existing or future materials specifications of high performance, long distance antennas using HF, VHF, or UHF frequency bands for parasitic and all-driven arrays, including stacked yagi and log-periodic designs, for determining the resonant frequency of such antennas and its relationship to size, and for determining wind speed survivability of long distance antennas;ANTENNA DESIGNER;
COROB Lawrence Technologies 5485 Beltline Road Suite 280 Dallas TX 75240 Computer software for defining, manipulating, and otherwise utilizing correlithm objects for use in the fields of computer programming, data structures, data representations, artificial intelligence, pattern recognition, robotics and synthetic organisms;Consulting and custom design of computer software for others for defining, manipulating, and otherwise utilizing correlithm objects for use in the fields of computer programming, data structures, data representations, artificial intelligence, pattern recognition, robotics and synthetic organisms;
DECKANGL Stamps, Steven 14723 Hidden Meadows Drive Dubuque IA 52002 Computer software for defining, rendering and interpreting domain-specific ideogram language dictionaries based upon very strict design guidelines for use in abbreviating information in business and technical documents;
DIOEASY MARVIN TEST SYSTEMS, INC. 17570 Cartwright Road Irvine CA 92614 computer software for defining and generating digital data vectors for testing electronic circuits;DIO EASY;
DX ENGINEERING YAGI MECHANICAL PDS ELECTRONICS, INC. P.O. Box 909 Akron OH 44309 Computer software for defining and analyzing existing or future materials specifications of high performance, long distance antennas using HF, VHF, or UHF frequency bands for parasitic and all-driven arrays, including stacked Yagi and log-periodic designs, for determining the resonant frequency of such antennas and its relationship to size, and for determining wind speed survivability of long distance antennas;DX ENGINEERING and YAGI MECHANICAL;
HITSOFT IT HITACHI SOFTWARE ENGINEERING CO. LTD. 6-81, Onoe-cho Naka-ku, Yokohama Japan computer software for defining, modifying and printing process and data models for information systems;HIT SOFT IT;
MAIN UNIVERSAL LANGUAGE Yalamov, Krasimir B. 1151 Blair Avenue Sunnyvale CA 94087 Computer software for defining, implementing and facilitating the use of notational grammar-structured language for tasks of representation and processing of discrete information in the field of human-computer language;UNIVERSAL LANGUAGE;
MERIDIUM RCMO Meridium, Inc. 207 Bullitt Avenue, SE Roanoke VA 24013 Computer software for defining, implementing and evaluating maintenance strategies to optimize equipment performance;
NETSPEX PROFESSIONAL SOFTWARE SOLUTIONS, INC. Suite 200 1776 North State Street Orem UT 84057 Computer software for defining, editing and storing CAD and engineering standards and specifications in a relational database; for distributing CAD standards across a LAN, WAN or the Internet; for synchronizing CAD and engineering standards on remote servers; for placing standards-compliant layers, menus and drawing components into CAD drawings from a Web-enabled interface over a LAN, WAN or the Internet; and instructional manuals sold as a unit therewith;
PROCESSPRO Include Software Corporation 802 Cromwell Park Drive Suite H Glen Burnie MD 21061 Computer software for defining and organizing business processes;PROCESS PRO;
S MORTICE KERN SYSTEMS INTERNATIONAL SRL Bay House, Bay Street Bridgetown St. Michaels Barbados Computer software for defining, configuring, modifying, tracking, delivering and managing computer software and global computer network based projects, applications, computer programs, files, documents, content, processes and documentation therefor sold as a unit;Consulting, implementation, and management services to organizations with respect to the adoption and use of information technology and the conduct of e-business over global computer networks; installation, implementation, maintenance, training, project management and customization services with respect to computer software for defining, configuring, modifying, tracking, delivering and managing computer software and global computer network based projects, applications, computer programs, files, documents, content and processes;
SMALL BUSINESS SLIDERULE Vicor, Inc. 505 Hamilton Avenue Palo Alto CA 94301 Computer software for defining and accessing a database and manuals for use therewith, sold as a unit;
SPLIT Growth Resources, Inc. 1390 Market Street, Suite 200 San Francisco CA 94102 Computer software for defining and visualizing positions, people and groups of people with their different characteristics, for defining various characteristics expected in teams and positions such as vision, values, competencies or key performance indicators, for making use of graphical profiles to represent behaviors and expected or perceived roles, for analyzing dynamic of teams and interaction of people within the teams, for analyzing the morale, adaptation to the environment and performance of the teams and people, and for importing information from different personality measurement systems and other systems;Business management consultation in the field of executive and leadership development; Consulting services in the fields of business management, human resources, and business organizational design; Management and business consulting services in the field of training and recruitment;
STONE BOND Stone Bond GP 1990 Post Oak Boulevard, Suite 900 Houston TX 77056 Computer software for defining and managing data flows among software applications, data stores, and real-time data streams, with associated monitoring, business analytics, business process flow, data management, change management, time slice data capture for analysis, and security mechanisms;Consulting in the field of computer systems, namely, defining and managing data flows among software applications, data stores, and real-time data streams, with associated monitoring, business analytics, business process flow, data management, change management, time slice data capture for analysis, and security mechanisms;
SYNCPOINT PRINCETON SOFTECH, INC. 111 Campus Drive Princeton NJ 085406400 computer software for defining and removing users, managing system security, monitoring system performance, reporting on system performance and for extracting, analyzing, mapping, managing and validating data integrity for data stored in two or more databases;
SYNGENCE Lawrence Technologies 5485 Beltline Road Suite 280 Dallas TX 75240 COMPUTER SOFTWARE FOR DEFINING, MANIPULATING, AND OTHERWISE UTILIZING CORRELITHM OBJECTS FOR USE IN THE FIELDS OF COMPUTER PROGRAMMING, DATA STRUCTURES, DATA REPRESENTATIONS, ARTIFICIAL INTELLIGENCE, PATTERN RECOGNITION, ROBOTICS AND SYNTHETIC ORGANISMS;CONSULTING AND CUSTOM DESIGN OF COMPUTER SOFTWARE FOR OTHERS FOR DEFINING, MANIPULATING, AND OTHERWISE UTILIZING CORRELITHM OBJECTS FOR USE IN THE FIELDS OF COMPUTER PROGRAMMING, DATA STRUCTURES, DATA REPRESENTATIONS, ARTIFICIAL INTELLIGENCE, PATTERN RECOGNITION, ROBOTICS AND SYNTHETIC ORGANISMS;
SYNTHORG Lawrence Technologies 5485 Beltline Road Suite 280 Dallas TX 75240 COMPUTER SOFTWARE FOR DEFINING, MANIPULATING, AND OTHERWISE UTILIZING CORRELITHM OBJECTS FOR USE IN THE FIELDS OF COMPUTER PROGRAMMING, DATA STRUCTURES, DATA REPRESENTATIONS, ARTIFICIAL INTELLIGENCE, PATTERN RECOGNITION, ROBOTICS AND SYNTHETIC ORGANISMS;CONSULTING AND CUSTOM DESIGN OF COMPUTER SOFTWARE FOR OTHERS FOR DEFINING, MANIPULATING, AND OTHERWISE UTILIZING CORRELITHM OBJECTS FOR USE IN THE FIELDS OF COMPUTER PROGRAMMING, DATA STRUCTURES, DATA REPRESENTATIONS, ARTIFICIAL INTELLIGENCE, PATTERN RECOGNITION, ROBOTICS AND SYNTHETIC ORGANISMS;
VERTICAL SKY MORTICE KERN SYSTEMS INTERNATIONAL SRL Bay House, Bay Street Bridgetown St. Michaels Barbados Computer software for defining, configuring, modifying, tracking, delivering and managing computer software and global computer network based projects, applications, computer programs, files, documents, content, processes and documentation therefor sold as a unit;Consulting, implementation, and management services to organizations with respect to the adoption and use of information technology and the conduct of e-business over global computer networks; installation, implementation, maintenance, training, project management and customization services with respect to computer software for defining, configuring, modifying, tracking, delivering and managing computer software and global computer network based projects, applications, computer programs, files, documents, content and processes;
YARA CHRONICLE SECURITY IRELAND LIMITED 3RD FLOOR GORDON HOUSE, BARROW STREET DUBLIN D4 Ireland computer software for defining, identifying and detecting viruses, worms, trojans, spyware, adware, and malware;Computer virus protection services; computer services, namely, online scanning and detection of viruses, worms, trojans, spyware, adware, and malware on computers and electronic devices; computer programming and computer software consultancy;
YARA Rotarua Limited 3rd Floor Gordon House, Barrow Street Dublin 4 Ireland computer software for defining, identifying and detecting viruses, worms, trojans, spyware, adware, and malware;Computer virus protection services; computer services, namely, online scanning and detection of viruses, worms, trojans, spyware, adware, and malware on computers and electronic devices; computer programming and computer software consultancy;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.