CLOUD COMPUTING SERVICE FEATURING SOFTWARE

Brand Owner (click to sort) Address Description
CONCETTO GLODON COMPANY LIMITED BLDG 18TH, NO.8, DONGBEIWANG WEST ROAD HAIDIAN DISTRICT BEIJING 100000 China Cloud computing service featuring software used to visualize, analyze or create multi-dimensional designs in the fields of architecture, engineering, interior design, landscaping, game development and graphic arts;
CONCETTO BY GLODON GLODON COMPANY LIMITED BLDG 18TH, NO.8, DONGBEIWANG WEST ROAD HAIDIAN DISTRICT BEIJING 100000 China Cloud computing service featuring software used to visualize, analyze or create multi-dimensional designs in the fields of architecture, engineering, interior design, landscaping, game development and graphic arts;
ESOC Secure Channels Inc. 16400 Bake Parkway, Suite 100 Irvine CA 92618 Cloud computing service featuring software for use in securely accessing and sharing entertainment industry related content, securely accessing and sharing work-in-process content, and securely managing workflow and security;
NETSFERE Infinite Convergence Solutions, Inc. 3231 N. Wilke Road Arlington Heights IL 60004 Cloud computing service featuring software for securely exchanging information and data in the field of cloud based messaging for internal communication within a company or organization;
NETSFERE ENABLING COMMUNICATION Infinite Convergence Solutions, Inc. 3231 N. Wilke Road Arlington Heights IL 60004 Cloud computing service featuring software for securely exchanging information and data in the field of cloud based messaging for internal communication within a company or organization;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method and system for providing an electronic shopping service integrated into a software application, and for controlling the set of web sites that are reachable from within the shopping service. Each web site is represented by data which is signed by a private key, and the data together with this signature is delivered to a plurality of computing devices that provide the shopping service. Each of the computing devices has access to the public key that corresponds to the private key, and uses the public key to verify the signature. The computing device displays links to those web sites whose representative data validates against the signature.