COMPUTER SOFTWARE USED SCANNING

Brand Owner (click to sort) Address Description
BREEZE EASTMAN KODAK COMPANY 343 State Street Rochester NY 14650 computer software used for scanning, manipulating and printing images;
DEFIANT Defiant, Inc. 13675 E Davies Pl Englewood CO 80112 Computer software used for scanning and securing internet websites; software which allows users to identify information and website security vulnerability and cyber vulnerability; software for use with secure network and internet operations enabling users to review, manage, test, and analyze website security vulnerability, cyber vulnerability, cyber security analysis, and cyber security reporting; software which allows users to test websites for security and usability and receive security analysis and reports; software for ensuring the security of websites and their supporting platforms and services; computer anti-virus and security software;
THUNDER EASTMAN KODAK COMPANY 343 State Street Rochester NY 14650 computer software used for scanning, manipulating and printing images;
TORNADO EASTMAN KODAK COMPANY 343 State Street Rochester NY 14650 computer software used for scanning, manipulating and printing images;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Disclosed is a dynamically configurable threat scanning machine management system that utilizes a network to connect threat scanning machines with a central control computer. The central control computer can transmit, among other things, operational software and threat profiles to the threat scanning machines, while the threat scanning machines can transmit, among other things, images and performance data to the central computer. The threat scanning machine management system can be arranged in a hierarchical manner, which enables threat scanning machines at various locations to be connected into regional, national or international control centers for greater management efficiency. The network may be wireless and the control computer may be portable, enabling a supervisor to remotely manage the threat scanning machines while remaining mobile about the facility, or elsewhere. Additionally, the threat scanning machine management system can be accessed and monitored remotely from a web browser via secure Internet access.