DOWNLOADABLE COMPUTER APPLICATION THAT ENABLES

Brand Owner Address Description
SPINCYCLE Authentium, Inc. 7121 Fairway Drive, Suite 102 Palm Beach Gardens FL 33418 Downloadable computer application that enables identification, collation, modification and management of electronic images, text, video and hyperlinks by a single end user, or a network of end users, using a combination of the application and a computer or Internet browser; Computer application that enables objects, including images, text and video, to be dragged from one Internet Browser or web page to another Internet browser or web page; web page reformatting and customization tool that enables modification of web pages within a computer application and uploading of modifications to an end user or a network of end users;SPIN CYCLE;Marketing services, namely a web site or downloadable software application that provides a means for advertisers to broadcast content to an end user or a network of end users;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system enables a user to define the system's security profile while automatically detecting whether the security profile being defined creates data hazards for the computer system. To achieve the foregoing, the computer system utilizes memory and a security application. The security application displays a list of security rules to a user and selectively enables the security rules based on user inputs. The security application causes the computer system to enforce the enabled security rules by modifying security settings of the computer system. For each enabled rule, the security application analyzes data that indicates which of the security rules, when enforced by the computer system, create a data hazard for a particular computer application. The security application then detects a data hazard, if the data indicates that the enabled rule creates a data hazard for the particular application and if the particular application is installed on the computer system. The security application, in response to detection of the data hazard, may disable the foregoing rule or notify the user of the detected data hazard.