COMPUTER DATA WAREHOUSE SOFTWARE

Brand Owner (click to sort) Address Description
AMAZON REDSHIFT AMAZON TECHNOLOGIES, INC. 410 Terry Ave. N. Seattle WA 98109 Computer data warehouse software; database management software; data backup software; software for archiving and retrieving data; computer software for encryption and decryption; computer software that provides real-time, integrated business management intelligence by combining information from various databases; computer software for data transmission, storage, processing and reproduction; computer software for accessing, querying and analyzing information stored in databases and data warehouses;Technological services, namely, data warehousing services; technological services, namely, hosting, managing, provisioning, scaling, administering, maintaining, monitoring, securing, encrypting, decrypting, replicating and backing up databases for others; technological services, namely, software as a service (SAAS) services featuring software for use in database management, data access, data extraction and reporting and query functionality for management of data; technological services, namely, cloud computing featuring software for use in database management and data warehousing; technological services, namely, cloud hosting of electronic databases; technological services, namely, providing a website featuring non-downloadable software for database management and data warehousing; technological services, namely, electronic data storage; technological services, namely, providing database servers of variable capacity to others; technological services, namely, rental of computing and data storage facilities of variable capacity to third parties; technological services, namely, data encryption and decoding services; technological services, namely, management of on-line databases for others; technological services, namely, data processing services; technological services, namely, systematization of data in computer databases; technological services, namely, updating and maintenance of data in computer databases; technological services, namely, providing access to databases; technological services, namely, transmission of database information via telecommunications networks; technological services, namely, electronic data transmission; technological services, namely, providing access to remotely hosted computer applications through the Internet; technological services, namely, computer security services in the nature of maintaining security and integrity of databases and digital information; design and development of computer software;
EXCAVATOR HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP 11445 Compaq Center Drive West Houston TX 77070 Computer data warehouse software for use in management of data and information; computer application software for database management; computer software, namely, software for use in data warehousing, database management, data mining, and data analytics;Software as a service (SAAS) services featuring software for use in data warehousing, database management, data mining, and data analytics;
HP VERTICA SOLO HP HEWLETT PACKARD GROUP 10300 Energy Drive Spring TX 77389 Computer data warehouse software for use in management of data and information;
INFLUENCE SOFTWARE Influence Software, Inc. 845 Stewart Drive Sunnyvale CA 94086 computer data warehouse software for use in management of data and information;SOFTWARE;
VERTICA EXCAVATOR HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP 11445 Compaq Center Drive West Houston TX 77070 Computer data warehouse software for use in management of data and information; computer application software for database management; computer software, namely, software for use in data warehousing, database management, data mining, and data analytics;Software as a service (SAAS) services featuring software for use in data warehousing, database management, data mining, and data analytics;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and methods for detecting intrusions in the operation of a computer system comprises a sensor configured to gather information regarding the operation of the computer system, to format the information in a data record having a predetermined format, and to transmit the data in the predetermined data format. A data warehouse is configured to receive the data record from the sensor in the predetermined data format and to store the data in a database. A detection model generator is configured to request data records from the data warehouse in the predetermined data format, to generate an intrusion detection model based on said data records, and to transmit the intrusion detection model to the data warehouse according to the predetermined data format. A detector is configured to receive a data record in the predetermined data format from the sensor and to classify the data record in real-time as one of normal operation and an attack based on said intrusion detection model. A data analysis engine is configured to request data records from the data warehouse according to the predetermined data format and to perform a data processing function on the data records.