COMPUTER SOFTWARE PROGRAMMING TOOLS

Brand Owner (click to sort) Address Description
CYBERMETRICS Williams, Jay Curtis 5541 S. MARINE DRIVE TEMPE AZ 85283 computer software programming tools for assisting computer programmers in writing application software;CYBER METRICS;
MAJI Maji Technologies, Inc. P.O. Box 23 Middleburg VA 20018 Computer software programming tools for automating the administrative, financial, and clinical records of healthcare organizations;
MAJI TECHNOLOGIES Maji Technologies, Inc. P.O. Box 23 Middleburg VA 20018 COMPUTER SOFTWARE PROGRAMMING TOOLS FOR AUTOMATING THE ADMINISTRATIVE AND FINANCIAL RECORDS OF COMPANIES AND ORGANIZATIONS;DATA PROCESSING SERVICES FOR OTHERS, NAMELY, AUTOMATING THE ADMINISTRATIVE AND FINANCIAL RECORDS OF COMPANIES AND ORGANIZATIONS;TECHNOLOGIES;
RAPIDMIND INTEL CORPORATION 2200 Mission College Boulevard Santa Clara CA 95052 computer software programming tools for graphics accelerators, parallel machines, game platforms and embedded processors;RAPID MIND;computer software design and development;
SERIOUS HACK INTEL CORPORATION 2200 Mission College Boulevard Santa Clara CA 95052 Computer software programming tools for graphics accelerators, parallel machines, game platforms and embedded processors used in the development of computer games;Computer software design and development;
SERIOUS HACK RAPIDMIND INC. 180 KING STREET SOUTH, STE. 500 ALLEN SQUARE WATERLOO N2J 1P8 Computer software programming tools for graphics accelerators, parallel machines, game platforms and embedded processors used in the development of computer games;Computer software design and development;
SERIOUS HACK Serious Hack Inc. School of Computer Science 200 University Avenue W. Waterloo Ontario N2L 3G1 Canada Computer software programming tools for graphics accelerators, parallel machines, game platforms and embedded processors used in the development of computer games;Computer software design and development;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.