COMPUTER SOFTWARE RISK MANAGEMENT

Brand Owner (click to sort) Address Description
E-ACCESS E.W. Blanch Holdings, Inc 500 North Akard Suite 4500 Dallas TX 75201 Computer Software for Risk Management and Actuarial Services and Related Users Manuals Sold as a Unit;E ACCESS;
FORWARD TERRAIN METATHEME PTY LTD 35 Douglas Street Toorak VIC 3142 Australia Computer software for risk management, knowledge management and early warning systems, and prerecorded compact discs and CD-ROMS featuring educational information about business management,l;Business consulting featuring business organization and business methodology;
PIPELINESOFT Geonamic Systems, Inc. 6740 East Johns Crossing, Suite 490 Johns Creek GA 30097 computer software for risk management of pipeline for oil industry, including fault detection, pipeline route mapping, and land use impact assessment;PIPELINE SOFT;
PROPHET RAYTHEON COMPANY 870 Winter Street Waltham MA 02451 computer software for risk management and instruction manuals sold therewith;printed training materials on the subject of risk management;
QUICKSTARS QUICKSTARS 210 LEE BOULEVARD SAVANNAH GA 314055613 Computer software for risk management; Computer software for risk management that may be downloaded from a global computer network;In the statement, column 1, before line 1, Quickstars, L.L.C. (Georgia Limited Liability Company), 210 Lee Boulevard, Savannah, GA 314055613 should be inserted.;QUICK STARS;
QUICKSTARS Lebedovych, Orest, W 210 Lee Boulevard Savannah GA 31405 Computer software for risk management; Computer software for risk management that may be downloaded from a global computer network;In the statement, column 1, before line 1, Quickstars, L.L.C. (Georgia Limited Liability Company), 210 Lee Boulevard, Savannah, GA 314055613 should be inserted.;QUICK STARS;
RISK EXPLORER Ultimate Risk Solutions, Inc. 135 Maybin Circle Owings Mills MD 21117 computer software for risk management purposes;
RISK PRO BLACKBURN, ROBERT J. 23 Bremen Circle Penfield NY 14526 computer software for risk management;RISK;
RISK2000 Computer Risk Management, Inc. Post Office Drawer 26227 Oklahoma City OK 73126 computer software for risk management, claims administration and actuarial analysis;RISK 2000;
RISK2003 Computer Risk Management, Inc. Post Office Drawer 26227 Oklahoma City OK 73126 computer software for risk management, claims administration and actuarial analysis;RISK 2003;
RISK2005 Computer Risk Management, Inc. Post Office Drawer 26227 Oklahoma City OK 73126 computer software for risk management, claims administration and actuarial analysis;RISK 2005;
RISK2007 Computer Risk Management, Inc. Post Office Drawer 26227 Oklahoma City OK 73126 computer software for risk management, claims administration and actuarial analysis;RISK 2007;
RISKRESOLVE FRS AMERICA, INC. 119 RUSSELL STREET FIRST FLOOR LITTLETON MA 01460 Computer software for risk management and regulatory compliance associated with business process management;RISK RESOLVE;
RISKRESOLVE Providus Software Solutions, Inc. 1803 Research Boulevard Rockville MD 20850 Computer software for risk management and regulatory compliance associated with business process management;RISK RESOLVE;
RISKRESOLVE FICS AMERICA, INC. 2700 LAKE COOK ROAD WKUS LAW DEPT. RIVERWOODS IL 60015 Computer Software for risk management and regulatory compliance associated with business process management;RISK RESOLVE;
RISKRESOLVE FICS AMERICA, INC. 2700 LAKE COOK ROAD WKUS LAW DEPT. RIVERWOODS IL 60015 Computer Software for risk management and regulatory compliance associated with business process management;The mark consists of the word RISKRESOLVE in blue and a Design of a Blue Square containing Light Blue, Green, Yellow and Orange Squares.;RISK RESOLVE;The color(s) Blue, green, yellow, light blue and orange is/are claimed as a feature of the mark.;
RISKRESOLVE Providus Software Solutions, Inc 1803 Research Boulevard Rockville MD 20850 Computer Software for risk management and regulatory compliance associated with business process management;RISK RESOLVE;
RNAV Collaborative Information Systems 3912 Bluejay Lane Naperville IL 60564 Computer Software for Risk Management, Compliance Management, Learning Management, Content Management, Project and Task Management, Surveys, Incident and Event Reporting and Governance;
SIMPLERISK SIMPLERISK, INC. 16602 CORDILLERA DRIVE ROUND ROCK TX 78681 Computer software for risk management that may be downloaded from a global computer network;SIMPLE RISK;
SIMPLERISK Simplerisk 16602 Cordillera Dr. Round Rock TX 78681 Computer software for risk management that may be downloaded from a global computer network;SIMPLE RISK;
THE MADISON SYSTEM Madison Associates Four Fort Beach Way Marblehead MA 01945 Computer software for risk management and administration of commercial loan portfolios;SYSTEM;
THE MADISON SYSTEM Madison Associates Four Fort Beach Way Marblehead MA 01945 Computer software for risk management and administration of commercial loan portfolios;SYSTEM;
XPERT AML CONSULTING INTEGRATING SERVICES INC. 325 S BISCAYNE BLVD, SUITE 1723 MIAMI FL 33131 Computer software for Risk Management and Anti-Money Laundering;
ZURICH VELOCITY ZURICH INSURANCE COMPANY LTD Mythenquai 2 Zurich 8002 Switzerland Computer software for risk management in the field of safety risks, property risks, liability risks, business continuity risks, supply chain risks, disaster preparedness and compliance;as to ZURICH;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.