COMPUTER SOFTWARE USED PREVENT

Brand Owner (click to sort) Address Description
CONTENT WITHOUT COMPROMISE VYOU.COM Inc. 2 North Second Street, Suite 1450 San Jose CA 951131333 computer software used to prevent the unauthorized copying and redistribution of content;licensing of on-line non-downloadable computer software for the prevention of unauthorized copying and redistribution of content from web sites;
ETHINK KEPNER-TREGOE, INC. 103 Carnegie Center, Suite 205 Princeton NJ 08540 computer software used to prevent potential problems, solve existing problems, aid in decision making, and track the actions taken related to the problem solving and decision making in the field of business;E THINK;
ETHINK KEPNER-TREGOE, INC. 103 Carnegie Center, Suite 205 Princeton NJ 08540 Computer software used to prevent potential problems, solve existing problems, aid in decision making, and track the actions taken related to the problem solving and decision making in the field of business;
KT MEMORY BANK KEPNER-TREGOE, INC. 103 Carnegie Center, Suite 205 Princeton NJ 08540 COMPUTER SOFTWARE USED TO PREVENT POTENTIAL PROBLEMS, SOLVE EXISTING PROBLEMS, AID IN DECISION MAKING, AND TRACK THE ACTIONS TAKEN RELATED TO THE PROBLEM SOLVING AND DECISION MAKING IN THE FIELD OF BUSINESS;MEMORY BANK;
LOCKTOGRAPHY INTELLECTUAL PROTOCOLS 150 Airport Executive Park Nanuet NY 10954 Computer software used to prevent and track copying of digital text, graphics and other data;
SCREENLOCK Nelson, Gregory S. PO Box 1172 PO Box 1172 Hilltop Lakes TX 77871 Computer software used to prevent unwanted access to data and programs; also used to provide instant locking or securing of a given computer for the purpose of providing access control to that computer;SCREEN LOCK;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.