COMPUTER SOFTWARE CRIME PREVENTION

Brand Owner (click to sort) Address Description
REAL SAFE MALTESE STE 390 7801 N Capital of TX Hwy Austin TX 78731 Computer software for crime prevention in schools and campuses, namely, a downloadable software platform featuring personal risk management information for use in analyzing situational risk, the ability to request assistance from colleagues, and contact the police;SAFE;
REAL SAFE MALTESE STE 390 7801 N Capital of TX Hwy Austin TX 78731 Computer software for crime prevention in real estate sales, namely, a downloadable software platform app featuring personal risk management information for use in analyzing situational risk, the ability to request assistance from colleagues, and contact the police;SAFE;
REAL SAFE AGENT MALTESE STE 390 7801 N Capital of TX Hwy Austin TX 78731 Computer software for crime prevention in real estate sales, namely, a downloadable software platform featuring personal risk management information for use in analyzing situational risk, the ability to request assistance from colleagues, and contact the police that may be downloaded from a global computer network;SAFE AGENT;
REALSAFE MALTESE STE 390 7801 N Capital of TX Hwy Austin TX 78731 Computer software for crime prevention in schools and campuses, namely, a downloadable software platform featuring personal risk management information for use in analyzing situational risk, the ability to request assistance from colleagues, and contact the police;REAL SAFE;
REALSAFE MALTESE STE 390 7801 N Capital of TX Hwy Austin TX 78731 Computer software for crime prevention in real estate sales, namely, a downloadable software app platform featuring personal risk management information for use in analyzing situational risk, the ability to request assistance from colleagues, and contact the police;REAL SAFE;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.