COMPUTER HARDWARE DETECTING

Brand Owner (click to sort) Address Description
HAPTIC HAPTIC, INC. 5402 Chevy Circle Austin TX 78723 computer hardware for detecting and processing verbal and non-verbal commands; recorded computer software for detecting and processing verbal and non-verbal commands; recorded computer software for training signal recognition algorithms using sensor data; recorded computer software using artificial intelligence for training signal recognition algorithms using sensor data;HAP TIC;consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; design and development of computer software for training signal recognition algorithms using sensor data; design and development of software and hardware for transforming surfaces into activated control interface surfaces; providing temporary use of online non-downloadable computer software for detecting and processing verbal and non-verbal commands;
PULSE Infocyte, Inc. 5 Centerpointe Drive, Suite 400 Lake Oswego OR 97035 Computer hardware for detecting, assessing and eliminating security threats, breaches, malware and unauthorized activity on computer networks; Computer software for detecting, assessing and eliminating security threats, breaches, malware and unauthorized activity on computer networks;Software as a service (SAAS) services featuring software for detecting, assessing and eliminating security threats, breaches, malware and unauthorized activity on computer networks;
PWN PRO Outpost24 AB Blekingegatan 1 Karlskrona 37157 Sweden Computer hardware for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing;PRO;
PWNIE Outpost24 AB Blekingegatan 1 Karlskrona 37157 Sweden Computer hardware for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing;Computer security services in the nature of network security assessments; software as a service (SAAS) services featuring software for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing;
PWNIE EXPRESS Outpost24 AB Blekingegatan 1 Karlskrona 37157 Sweden Computer hardware for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing;PONY EXPRESS;Computer security services in the nature of network security assessments; software as a service (SAAS) services featuring software for detecting and identifying access to computer networks and resources, performing vulnerability scans, and penetration testing;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer program product is provided that is readable by a computing system and encoding a computer program of instructions. The computer program product includes a hardware protected region that is utilized to store a portion of a computer BIOS. The BIOS includes a compressed computer program for restoring at least a portion of the computer BIOS when uncompressed and executed. The computer program product also includes a non-hardware protected region that is utilized to store the remainder of the computer BIOS. The hardware protected region may include an uncompressed computer program that may be utilized to uncompress the compressed program. The hardware protected region may also include an uncompressed program for detecting and initializing one or more memory devices within the computer system. Methods and apparatus are also provided for creating and utilizing the contents of the computer program product.