SOFTWARE PROTECTING SECURING

Brand Owner (click to sort) Address Description
INFRARED WEBROOT INC. 385 Interlocken Crescent, Suite 800 Broomfield CO 80021 Software for protecting and securing the integrity of computing devices, mobile phones and network systems; security software for protecting computers from malicious software;Computer security services, namely, restricting access to and by computer networks to and of undesired web sites, media and individuals and facilities, detecting and assessing threats to computing devices; computer services, namely, providing information regarding risks and vulnerabilities for computers, networks and mobile electronic devices; computer services for protecting and securing the integrity of computing devices, mobile phones and network systems, namely, providing temporary use of on-line non-downloadable software for protecting and securing the integrity of mobile phones, computing devices, and network systems;
SECUREANYWHERE WEBROOT INC. 385 Interlocken Crescent, Suite 800 Broomfield CO 80021 Software for protecting and securing the integrity of computing devices, mobile phones and network systems;SECURE ANYWHERE;Computer services, namely, providing a cloud computing system comprising servers and software for protecting and securing the integrity of computing devices, mobile phones and network systems against viruses, malware and other threats;
SMARTER CYBERSECURITY WEBROOT INC. 385 Interlocken Crescent, Suite 800 Broomfield CO 80021 Software for protecting and securing the integrity of computing devices, mobile phones and network systems;SMARTER CYBER SECURITY;Computer services, namely, providing a cloud computing system comprising servers and software for protecting and securing the integrity of computing devices, mobile phones and network systems against viruses, malware and other threats;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for protecting software components of a software system can be used to guard against faults which might occur during the execution of a software component. A software component which is particularly prone to faults may be designated for protection. Faults occurring during execution of these protected software components can be detected, execution of the protected software component can be halted, and the software system may be restored to the state it held before execution of the protected software component commenced. The software system can then resume executing in a normal manner. Furthermore, a default value for the protected software component may be assigned in the event that a fault is detected during execution of the protected software component.