COMPUTER SOFTWARE DISTRIBUTED THREAT

Brand Owner (click to sort) Address Description
HIRSA PERSISTENT SENTINEL Suite 100 14301 FNB Parkway Omaha NE 68154 Computer software for distributed threat detection, reporting, and common display of land-based and expeditionary anti-terrorism and force protection operations that enables connections with a variety of networked sensors and handheld/portable computing devices linked to a central server, and provides land-based or expeditionary force protection personnel with the ability to share threat reports, view a common operating picture, and issue or receive action recommendations regarding potential and actual physical threats to a protected area, assets, or infrastructure, in near real-time;HI REPORTING AND SITUATIONAL AWARENESS;
SENTINELNET PERSISTENT SENTINEL Suite 100 14301 FNB Parkway Omaha NE 68154 Computer software for distributed threat detection, reporting, and common display for maritime force protection operations, namely, a distributed software application capable of connecting with a variety of networked sensors and handheld/portable computing devices linked to a central server, providing maritime force protection personnel with the ability to share threat reports, view a common operating picture, and issue action recommendations regarding potential and actual physical threats to a protected area, assets, or infrastructure, in near real-time;SENTINEL NET;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A dynamically configurable threat scanning machine management system is capable of tracking information associated with one ore more items and/or passengers. The central control computer network can transmit, among other things, operational software and threat profiles to the threat scanning machines, while the threat scanning machines can transmit, among other things, images, alarms, and performance data to the central computer that can be distributed to one or more operator stations and/or other command and control centers for review and analysis. The threat scanning machine management system can be arranged in a hierarchical manner which enables threat scanning machines at various locations to be connected into regional, national or international control centers. The tracked information and alarm generation and distribution allow, for example, comparison to other information to determine if an alarm or change in thresholds or sensitivity is warranted.