PERSONAL COMPUTER SOFTWARE ANALYZING

Brand Owner (click to sort) Address Description
FUELSTAR EFS National Bank 2525 Horizon Lake Drive Ste 120 Memphis TN 38133 personal computer software for analyzing fuel transactions for trucking companies;FUEL STAR;
OUTSMART MARKETWARE CORPORATION 101 Yesler Way, Suite 201 Seattle WA 98104 personal computer software for analyzing and administering promotional funds by retailers, wholesalers, distributors, and manufacturers of consumer products;OUT SMART;
PROMOSMART! MARKETWARE CORPORATION 101 Yesler Way, Suite 201 Seattle WA 98104 personal computer software for analyzing and administering promotional funds by retailers, wholesalers, distributors, and manufacturers of consumer products;PROMO-SMART;
PROMOSMART! Promotion Technologies, Inc. 3120 MEDLOCK BRIDGE ROAD BLDG. E, SUITE 260 NORCROSS GA 30071 PERSONAL COMPUTER SOFTWARE FOR ANALYZING AND ADMINISTERING PROMOTIONAL FUNDS BY RETAILERS, WHOLESALERS, DISTRIBUTORS, AND MANUFACTURERS OF CONSUMER PRODUCTS;PROMOTION SMART;
SNET BILLWORKS SOUTHERN NEW ENGLAND TELECOMMUNICATIONSCORPORATION 227 Church Street New Haven CT 06510 personal computer software for analyzing telecommunications billing data;
YARDSTICK MARKETWARE CORPORATION 101 Yesler Way, Suite 201 Seattle WA 98104 personal computer software for analyzing and administering promotional funds by retailers, whole salers, distributors, and manufacturers of consumer products;YARD STICK;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method, an apparatus and a computer program product are disclosed for providing a lockeddown client environment in a client-server architecture of a computer network. In the method, an asset database is checked via the computer network to validate settings for configuration of the personal computer. The personal computer is booted using a personalized network boot disk for a user. The asset database contains information about the configuration of one or more personal computers. If the settings are validated, a lockeddown environment is built for the personal computer. The operating system and hardware drivers installed on the personal computer are dependent upon the asset database. The operating system prevents unauthorised modification and bypassing of the operating system. Preconfigured application software is installed on the personal computer dependent upon the asset database. User data can only be stored remotely at a server via the computer network.