COMPUTER SOFTWARE NAMELY COMPUTER SOFTWARE

Brand Owner (click to sort) Address Description
BW BONDWIRELESS Wireless Applications Pty Ltd Suite 3 Australia Computer software namely computer software for websites and computer interfaces used to provide the transmission and retrieval of data, images, videos and documents primarily via SMS (Short Messaging Service), EMS (Electronic Messaging Service), MMS (Multi-Media Messaging Services) and 3G (Third Generation) telecommunications systems;Telecommunications services in the nature of electronic transmission and retrieval of data, images, videos and documents primarily via SMS (Short Messaging Service), EMS (Electronic Messaging Service), MMS (Multi-Media Messaging Services) and 3G (Third Generation) telecommunications systems;BOND WIRELESS;
E-TERMINAL JET LAB S.r.I Corso del Popolo 104, 20038 Seregno Milano Italy Computer software namely computer software for use in client/server environments, computer software for producing applications for use in a network environment, emulator software, computer software for graphical applications;
HEALTH QUOTIENT LIFESTYLE DESIGN, INC. 37 Sunnyside Lane St. Paul MN 55118 Computer software namely computer software to evaluate and measure the health status of individuals;HEALTH;Providing health care services to individuals and organizations, namely, measuring the health status of individuals, and counseling individuals on how to promote good health;
IMPERSONATOR Lips, Inc. 1800 Perimeter Park Drive, Suite 275 Morrisville NC 27560 Computer software namely computer software programs for graphics animation, namely for the creation of facial animation and the synchronization of speech with animated characters, namely for use by game developers;
JAWS XMAIL Jaws Technologies Inc. Suite 380 603-7th Avenue S.W. Calgary, Alberta T2P 2T5 Canada computer software namely computer software for the protection, preservation and security of electronic data, namely encryption, and firewall software; computer hardware, namely computer hardware for the protection, preservation and security of electronic data, namely encryption and firewall hardware;consultation services for protection, preservation and security of electronic data, namely, consulting services of auditing, reviewing and advising on computer security policies and procedures; and computer security services, namely, providing encryption and firewall security for others;
MORGAN BODY BUILDER Morgan Corporation 35 Thousand Oaks Blvd. Morgantown PA 19543 COMPUTER SOFTWARE NAMELY COMPUTER SOFTWARE USED FOR OBTAINING PRICE QUOTES;
POCKETCHANGE POCKETSCIENCE, INC. 2075 De La Cruz Blvd. Santa Clara CA 95050 COMPUTER SOFTWARE NAMELY COMPUTER SOFTWARE FOR MOBILE ELECTRONIC COMMERCE;POCKET CHANGE;
SMARTMAILER PITNEY BOWES INC. 3001 Summer Street Stamford CT 06926 COMPUTER SOFTWARE NAMELY COMPUTER SOFTWARE PROGRAMS FOR USE IN INFORMATION AND MAIL MANAGEMENT AND SERVICE, NAMELY, MAINTAINING ADDRESS DATABASES, CREATING MAILING LISTS, MERGING ADDRESS DATA FOR REMOVAL OF DUPLICATION, ADDRESS TRACKING, ADDRESS VERIFICATION, PRESORTING MAIL, PRESORTING MAIL RATES, ENVELOPE DESIGN, CREATING POSTAL REPORTS AND TRACK/SACK LABELS, ADDRESS LIST QUERIES, AND CREATING OF DELIVERY POINT BAR CODES;SMART MAILER;
XMAIL Jaws Technologies Inc. Suite 380 603-7th Avenue S.W. Calgary, Alberta T2P 2T5 Canada computer software namely computer software for the protection, preservation and security of electronic data, namely encryption, and firewall software; computer hardware, namely computer hardware for the protection, preservation and security of electronic data, namely encryption and firewall hardware;consultation services for protection, preservation and security of electronic data, namely, consulting services of auditing, reviewing and advising on computer security policies and procedures; and computer security services, namely, providing encryption and firewall security for others;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.