DOWNLOADABLE COMPUTER SOFTWARE LIBRARIES

Brand Owner (click to sort) Address Description
ASTERIA CHRONO ASTERIA CORPORATION 1-1-39 Hiroo, Shibuya-ku TOKYO 150-0012 Japan Downloadable computer software libraries for use in general purpose computation of large datasets in the field of blockchain; Downloadable computer software libraries, namely, downloadable electronic data files consisting of software hosting and storage tools for use with blockchain technology; downloadable computer software for dataset storage, computation, and management in the field of blockchain technology; downloadable computer software for interacting with blockchain platforms; downloadable computer software for dataset storage, computation, and management for use with blockchain technology and cryptocurrency;Providing temporary use of online non-downloadable computer software libraries for use in general purpose computation of large datasets in the field of blockchain; providing temporary use of online non-downloadable computer software libraries, namely, non-downloadable electronic data files consisting of software hosting and storage tools for use with blockchain technology; providing temporary use of online non-downloadable cloud-based software for dataset storage, computation, and management for use with blockchain technology; providing temporary use of online non-downloadable computer software for data authentication via blockchain technology;
CODEX Substrate 5223 Weiss Ln Irving TX 75039 Downloadable computer software libraries for creating, managing, validating, testing, and executing blockchain-based smart contracts and scripts for use in legal and commercial transactions; Software libraries in the nature of downloadable computer software development tools;
SECURENTITY JW Secure Inc. 1752 NW Market St., Ste 227 Seattle WA 98107 Downloadable computer software libraries for encryption and security of remotely stored data;SECURE ENTITY;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.