COMPUTER NETWORK UTILITY PROGRAMS

Brand Owner (click to sort) Address Description
AUDITWARE Preferred Systems, Inc. 1341 West 6th Street Erie PA 16505 computer network utility programs for documentation, reporting, and security;IN THE STATEMENT, COLUMN 1, LINE 1, CONNECTICUT SHOULD BE DELETED, AND DELAWARE SHOULD BE INSERTED.;AUDIT WARE;
BINDVIEW BINDVIEW DEVELOPMENT CORPORATION Legal Dept 5151 San Felipe, Suite 2500 Houston TX 770563607 computer network utility programs;BIND-VIEW;
BINDVIEW+ LAN Support Group, Inc. Suite 100 520 Post Oak Boulevard Houston TX 77027 computer network utility programs;bind view plus;
DS MIGRATE Preferred Systems, Inc. 1341 West 6th Street Erie PA 16505 computer network utility programs;MIGRATE;
DS STANDARD Preferred Systems, Inc. 1341 West 6th Street Erie PA 16505 computer network utility programs;IN THE STATEMENT, COLUMN 1, LINE 1, CONNECTICUT SHOULD BE DELETED, AND DELAWARE SHOULD BE INSERTED.;
DS WARE Preferred Systems, Inc. 1341 West 6th Street Erie PA 16505 computer network utility programs;DS;
NDS BROWSER Preferred Systems, Inc. 1341 West 6th Street Erie PA 16505 computer network utility programs;NDS BROWSER;BROWSER;
NDS NAVIGATOR Preferred Systems, Inc. 1341 West 6th Street Erie PA 16505 computer network utility programs;
NTVIEW US DATA SECURITY, INC. 217 EAST 86TH STREET, SUITE 213 NEW YORK NY 10028 computer network utility programs and instructional program manuals, sold therewith as a unit;NT VIEW;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system includes various security measures to insure that semi-permanent operating programs, such a boot blocks and firmware, are updated properly. For example, the system may include a security switch that can enable a host computer to load a replacement program into another computer, such as an appliance server for example, if the other computer fails. Also, if a replacement program is being loaded over a network connection that fails, the loading can resume automatically after re-establishment of the network connection. In addition, certain programs, such as boot blocks, may be verified in an execution memory, such as RAM, and loaded into a more permanent storage memory, such as ROM, only if verified.