COMPUTER UTILITY SOFTWARE PROGRAMS

Brand Owner (click to sort) Address Description
CONFIGSAFE Imagine LAN, Inc. 74 Northeastern Blvd. Suite 12 Nashua NH 03062 computer utility software programs;CONFIGURE SAFE;
FAST FIND SYMANTEC CORPORATION 350 Ellis Street Mountain View CA 94043 computer utility software programs; computer software for use in locating and managing files and documents; computer software for use in accessing text, graphics, electronic documents, multimedia data, and computer software which may be downloadable from a global communications network; and instructional manuals therefor;
HERE & NOW SOFTWARE ARCHITECTS, INC. Westchester IL 60154 computer utility software programs; computer software programs for managing, loading and converting computer files and data storage media and devices across disparate computer platforms and operating environments; and manuals therefor, sold as a unit;
INTERNET FASTFIND SYMANTEC CORPORATION 350 Ellis Street Mountain View CA 94043 computer utility software programs; computer software for use in locating and managing files and documents; computer software for use in accessing text, graphics, electronic documents, multimedia data, and computer software which may be downloadable from a global communications network; and instructional manuals therefor;INTERNET;
Y2K Database Architects, Inc. 43604 Golden Meadow Circle, Suite 600 Ashburn VA 20147 computer utility software and programs for date adjustment calulations and computer system date handling modifications;
Y2K! Database Architects, Inc. 43604 Golden Meadow Circle, Suite 600 Ashburn VA 20147 computer utility software and programs for date adjustment calculations and computer system date handling modifications;Y2K;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method and system for auditing software systems by monitoring the use and non-use of software programs in a computer. An operating system of the computer controls execution of software products through the invocation of respective load modules thereof. A monitor is periodically triggered to collect load module execution information, which is filtered by a filtering module, and a correlator correlates load module execution information with data that associates load module names with corresponding software products and develops a list of products executed in the computer over the course of a given time period.