COMPUTER SOFTWARE USED ENSURE

Brand Owner (click to sort) Address Description
BLUEHERRING Assured Enterprises, Inc. 8300 Boone Boulevard Vienna VA 22182 Computer software used to ensure the secure and authentic transmission, storage, processing, and communication of information, documents and data at the point of sale, and via a global computer network, wide-area computer networks, and/or peer-to-peer computer networks; Computer software used to monitor, track, detect, and prevent fraud when transmitting, storing, processing, and communicating information, documents and data at the point of sale, and via a global computer network, wide-area computer networks, and/or peer-to-peer computer networks;BLUE HERRING;Computer services, namely monitoring of computer systems for security purposes;Installation, maintenance and repair of computer software for use by others for use to ensure the secure and authentic transmission, storage, processing, and communication of information, documents and data at the point of sale, and via a global computer network, wide-area computer networks, and/or peer-to-peer computer networks; Software as a service (SAAS) services, namely, featuring software for use by others for use to ensure the secure and authentic transmission, storage, processing, and communication of information, documents and data at the point of sale, and via a global computer network, wide-area computer networks, and/or peer-to-peer computer networks;
VALIDUS Digital Manufacturing Solutions Inc. 3600 Rhodes Drive Windsor, Ontario N8W5A4 Canada Computer software used to ensure a part design (CAD model) complies with manufacturing capabilities;VALID US;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.