COMPUTER SOFTWARE PRODUCTS USED

Brand Owner (click to sort) Address Description
BB eXtreming, inc. 11350 Ventura Boulevard Suite #205 Studio City CA 91604 Computer and software products used to distribute transactional, interactive electronic media data and informational platforms, that include-- CD-Rom's, DVD's floppy disks and other storage devices that are embedded with electronic information, a search engine, audio and video files, media players, a shopping cart, graphics and picture files, user profiling and data mining software and an interactive interface to communicate to a remote server or through the Internet;
BRAND BLASTER eXtreming, inc. 11350 Ventura Boulevard Suite #205 Studio City CA 91604 Computer and software products used to distribute transactional, interactive electronic media data and informational platforms, that include-- CD-Rom's, DVD's floppy disks and other storage devices that are embedded with electronic information, a search engine, audio and video files, media players, a shopping cart, graphics and picture files, user profiling and data mining software and an interactive interface to communicate to a remote server or through the Internet;
EXTREMING eXtreming, inc. 11350 Ventura Boulevard Suite #205 Studio City CA 91604 Computer and software products used to distribute transactional, interactive electronic media data and informational platforms, that includes- CD-ROMS, DVD's floppy disks and other storage devices that are embedded with electronic information, a search engine, audio and video files, media players, a shopping cart, graphics and picture files, user profiling and data mining software and an interactive interface to communicate to a remote server or through the Internet;
GIPS GREEN MOUNTAIN GEOPHYSICS, INC. 321 CARRIAGE HILLS EST. JSR BOULDER CO 803029403 computer software products used in connection with geographic information and positioning;
L-MAIL Letter-Matics, Inc. 555 Bergen Boulevard Ridgefield NJ 07657 Computer software products used for the production, merging, co-mingling, printing and posting of documents to be mailed;LETTER-MATICS-MAIL;
LMI Letter-Matics, Inc. 555 Bergen Boulevard Ridgefield NJ 07657 Computer software products used for the production, merging, co-mingling, printing and posting of documents to be mailed;LETTER MATICS INC;
REMEDI Woodhaven Pharmacy Services Suite F 9006 Yellow Brick Road Baltimore MD 21237 computer software products used in an institutional pharmacy operating system, delivered online via a secure web portal to nursing homes, assisted living facilities and other institutions;REMEDY;
SECURIFY SECURVANTAGE STUDIO SECURIFY, INC. Suite 200 20425 Stevens Creek Boulevard Cupertino CA 95014 computer software products used to detect and respond to threats to computer network security; computer sofware products used to manage, maintain and monitor computer network security, computer network management and computer network maintenance; computer software products used to develop and analyze policies used for computer network security, management and maintenance and user manuals provided in connection therewith;maintenance of computer hardware and software for computer network management and security, computer network policies, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local computer networks;consulting and support services in the fields of computer network management, computer network monitoring, computer network maintenance, and in the field of policies used for computer network security, management and maintenance; consulting, development and support services in the fields of computer software used to detect and respond to threats to computer network security, computer sofware products used to manage, maintain and monitor computer network security, computer network management and computer network maintenance, computer software products used to develop and analyze policies used for computer network security, management and maintenance and policies used for computer network security, maintenance and management; security services, namely, computer security consulting, testing and monitoring of hardware and software in the fields of computer network management, development, security and maintenance, policies for computer network security, management and maintenance, fraud prevention, computer crimes, and potential security risks in the nature of breaches of encryption, certification, authorization, authentication, data secrecy and data integrity of programs located on local and global computer networks; and design of computer software for others;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A job accounting and chargeback system for software products is comprised of a software license manager in the form of a software product use monitoring subsystem that handles requests for and grants rights to use software products, in such a manner that chargeback data is developed, which is then referenced to entities that are charged for the use of the software products. To better correlate the chargeback data with the use of software products, the chargeback data is referenced to the actual amount and type of use of software products being used, rather than on the use of computer facilities.