SOFTWARE ALLOWING USER

Brand Owner (click to sort) Address Description
DATAFLEX Geographic Services, Inc. 7901 Jones Branch Dr. McLean VA 22102 Software allowing the user to perform multi-lingual, phonetic-based searches of databases;DATA FLEX;
ENHANCED POWER SCAN PC-TEL, INC. 471 Brighton Drive Bloomingdale IL 60108 Software for allowing a user to measure the total received power within a user-designated time and frequency; Receivers for radio propagation measurement and for generation of statistical data regarding radio propagation measurement, all for cellular, PCS, and wireless communication networks;
GSI DATAFLEX Geographic Services, Inc. 7901 Jones Branch Dr. McLean VA 22102 Software allowing the user to perform multi-lingual, phonetic-based searches of databases;GEOGRAPHIC SERVICES INC DATA FLEX;
IAUGMENT Kinsley, Elizabeth 7039 Highway 190 E Svc Rd. #C Covington LA 70433 Software allowing a user to load an image and view modified versions of the image showing different appearances resulting from different size breast implants;I AUGMENT;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system, method, and computer program product for providing a encrypted email reader and responder is described. The method of distributing and initializing an encrypted electronic mail (email) software application for exchanging secure email, can include: obtaining by a first user a license for an email client software application program having public/private encryption; requesting by the first user that a second user download a reader/responder software application program in order to exchange encrypted email between the first user and the second user; downloading and installing the reader/responder software application program by the second user; sending an email by the second user to the first user including embedding an unencrypted public key by using a send key function of the reader/responder software application program; receiving the email from the second user by the first user, wherein the unencrypted public key is embedded in the email; responding by the first user by sending a second email to the first user, where the reader/responder software application program encrypts a message of the second email into an encrypted message using the unencrypted public key of the second user; receiving the second email by the second user with the encrypted message as an attachment from the first user into a third party email software application program, wherein the third party email software application program is different from the reader/responder software application program and the email client software application program; and opening by the second user the attachment to execute the reader/responder software application program operative to allow a user without the email client software to read and respond to encrypted email created and sent from a user having the email client software.