SUITE COMPUTER PROGRAMS

Brand Owner (click to sort) Address Description
BRIDGETRAK SUITE Mattus Inc. 129 McCarrell Lane Zelienople PA 16063 Suite of computer programs for use by customer support personnel and technical support help desk personnel for use in assisting in problem diagnosis, resolution, tracking and reporting of computer problems and issues in a help desk environment;BRIDGE TRACK SUITE;SUITE;
CARDWORKS! SystemSoft Corporation 2-6-1, Otemachi, Japan suite of computer programs for use with PCMCIA enabled computer systems;CARD WORKS;
SMART JOB nMetric 1261 E. Dyer Road, Suite 230 Santa Ana CA 92705 Suite of computer programs for use in the scheduling, planning, coordination, and execution of business, engineering, manufacturing, services, and supply chain activities, namely, order management, inventory management, resource procurement, allocation, and management, manufacturing processes and management, services coordination and management, logistics, distribution, and data analysis and management;
VISION:LEGACY STERLING SOFTWARE, INC. 300 Crescent Court, Suite 1200 Dallas TX 75201 suite of computer programs for assessing the quality and maintainability of applications by restructuring computer programs, redocumenting systems and graphically representing the flow of such applications and printed instructional manuals, therefor, sold as unit;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method and apparatus are disclosed for providing data from a service to a client based on the encryption capabilities of the client. Cipher suite lists are exchanged between a client and an endpoint. On the endpoint, the cipher suite list incorporates a mapping of cipher suite names to services. The endpoint uses the client's list of cipher suites in conjunction with the mapping of cipher suite names to services to determine a cipher suite match. A service is selected based on the cipher suite match. A server farm is selected based on the service. The client is informed of this cipher suite match and the endpoint retains knowledge of the cipher suite match throughout the session. Therefore, the encrypted connection between the client and the endpoint can be disconnected and later reestablished to provide data from the particular server.