COMPUTER SOFTWARE APPLICATION PROGRAM

Brand Owner (click to sort) Address Description
ASK AUNT ETHEL We The Shoppers.com, Inc. 230 Park Avenue New York NY 10169 computer software for application program interface for tracking sales transactions on another web site;
BILLY BUYER We The Shoppers.com, Inc. 230 Park Avenue New York NY 10169 computer software for application program interface for tracking sales transactions on another web site;
CIRCWORK INTEGRATED MARKETING TECHNOLOGY, INC. 50 Osgood Place Suite 330 San Francisco CA 94133 computer software application program for magazine circulation and direct marketing data management and analysis;
DELL MEDIA EXPERIENCE DELL INC. One Dell Way Round Rock TX 78682 Computer software application program for the management of digital media;media;
FIELDSTAR Datamatic, Inc. Suite 450 715 North Glenville Drive Richardson TX 75081 computer software application program for electronic assignment, tracking, dispatch, and point-of-service data collection of field work orders;FIELD STAR;
OPEN WAREHOUSE LATTICE SOFTWARE, INC. 357 SKYLINE DRIVE HAMILTON MT 59840 computer software application program for linking database software applications to stored data;OPEN;
PIXELSOFT PIXELSOFT, INC. 101 FIRST STREET, SUITE 429 Los Altos CA 94022 computer software application program for commercial (e.g., document image processing), technical and scientific image processing of non-entertainment images and the graphical interface for the software;
XTEND Network Computing Devices, Inc. 350 North Bernardo Avenue Mountain View CA 94043 computer software application program for use in administration and management of windowed terminals and display stations of computer networks;extend;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system, method, and computer program product for providing a encrypted email reader and responder is described. The method of distributing and initializing an encrypted electronic mail (email) software application for exchanging secure email, can include: obtaining by a first user a license for an email client software application program having public/private encryption; requesting by the first user that a second user download a reader/responder software application program in order to exchange encrypted email between the first user and the second user; downloading and installing the reader/responder software application program by the second user; sending an email by the second user to the first user including embedding an unencrypted public key by using a send key function of the reader/responder software application program; receiving the email from the second user by the first user, wherein the unencrypted public key is embedded in the email; responding by the first user by sending a second email to the first user, where the reader/responder software application program encrypts a message of the second email into an encrypted message using the unencrypted public key of the second user; receiving the second email by the second user with the encrypted message as an attachment from the first user into a third party email software application program, wherein the third party email software application program is different from the reader/responder software application program and the email client software application program; and opening by the second user the attachment to execute the reader/responder software application program operative to allow a user without the email client software to read and respond to encrypted email created and sent from a user having the email client software.