PROVIDING SOFTWARE INTERFACES AVAILABLE OVER

Brand Owner (click to sort) Address Description
SPLYST EMOGI TECHNOLOGIES, INC. 22 West 38th St, Floor 2 New York NY 10018 Providing software interfaces available over a network in order to create a personalized on-line information service; extraction and retrieval of information and data mining by means of global computer networks; creating indexes of information, indexes of web sites and indexes of other information sources in connection with global computer networks; providing information from searchable indexes and databases of information, including text, electronic documents, databases, graphics and audio visual information, by means of global computer information networks; providing an online community for registered users to share with other registered users the content received from searchable indexes and databases; providing temporary use of online non-downloadable computer software that enables Internet users to customize, create and publicly share data;
SPLYST SPLYST 1483 SW 161st Avenue Pembroke Pines FL 33027 Providing software interfaces available over a network in order to create a personalized on-line information service; extraction and retrieval of information and data mining by means of global computer networks; creating indexes of information, indexes of web sites and indexes of other information sources in connection with global computer networks; providing information from searchable indexes and databases of information, including text, electronic documents, databases, graphics and audio visual information, by means of global computer information networks; providing an online community for registered users to share with other registered users the content received from searchable indexes and databases; providing temporary use of online non-downloadable computer software that enables Internet users to customize, create and publicly share data;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method for analyzing impact on binaries, software, and hardware of a planned software upgrade for a computer system. The method includes performing a configuration inventory for the computer system with profiles for the computer system of hardware, software including operating system software, middleware, applications, development tools, and third party software, application interfaces, and binaries. A set of upgrade rules, e.g., rules defining hardware and software requirements including interfaces, libraries, dependencies, and more, are accessed and the binary profiles are analyzed based on the upgrade rules to determine safe binaries and at-risk binaries. The at-risk binaries are further divided into subcategories based on risks of incompatibility with the planned software upgrade. The subcategories include failure, high risk, and low risk. The method includes generating text or graphical reports providing the analysis results to quantify and qualify the impacts on binaries and other portions of the computer system.