INTEGRATED SUITE TECHNOLOGY

Brand Owner (click to sort) Address Description
CLEARCHAIN Penske Truck Leasing Co., L.P. 2675 Morgantown Road Reading PA 19607 An integrated suite of technology solutions, namely, software and hardware that provide web-based access to applications and services through a web operating system or portal interface to be used in connection with logistics and business management services in the fields of transportation, warehouse management and truck fleet management services;CLEAR CHAIN;
EXPERITECH Mirror Show Management Inc. 855 HARD ROAD WEBSTER NY 14580 An integrated suite of technology solutions, namely, computer software for use in the presentation of information in viewable and user-interactive formats at trade shows and trade show and vendor events;The wording EXPERITECH has no meaning in a foreign language.;
WOUNDSTAR Diversified Clinical Services, Inc. 4500 Salisbury Road, Suite 300 Jacksonville FL 32216 An Integrated Suite of Technology Solutions, Namely Software in the Field of Wound Care and Hyperbaric Medicine for the Purposes of Referral Management, Improving Clinical Productivity, Educating and Training Physicians and Nurses, and Collecting, Analyzing, and Generating Clinical, Financial, and Statistical Data;WOUND STAR;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method and apparatus are disclosed for providing data from a service to a client based on the encryption capabilities of the client. Cipher suite lists are exchanged between a client and an endpoint. On the endpoint, the cipher suite list incorporates a mapping of cipher suite names to services. The endpoint uses the client's list of cipher suites in conjunction with the mapping of cipher suite names to services to determine a cipher suite match. A service is selected based on the cipher suite match. A server farm is selected based on the service. The client is informed of this cipher suite match and the endpoint retains knowledge of the cipher suite match throughout the session. Therefore, the encrypted connection between the client and the endpoint can be disconnected and later reestablished to provide data from the particular server.