USE WITH COMPUTER SOFTWARE

Brand Owner (click to sort) Address Description
? MIRROR SOFTWARE CORPORATION 12530 - 128th Lane Northeast Kirkland WA 98034 use with computer software for verifying image authenticity;
GEAC ENTERPRISE SOLUTIONS GEAC ENTERPRISE SOLUTIONS, INC. 66 Perimeter Center East Atlanta GA 30346 use with computer software to permit on-line procurement of products and services on a global computer network;documentation for computer software;services for permitting access and use of on-line procurement software on a global computer network;
INTERNET RESOURCE MANAGER SEQUEL TECHNOLOGY CORPORATION 3245 146th Place SE., Suite 300 Bellevue WA 98007 for use with computer software and computer hardware for providing administration, evaluation and implementation of local area networks, wide area networks and global computer networks;INTERNET;for use with computer services for others, namely providing administration, evaluation and implementation of local area networks, wide area networks and global computer networks;
RALLY Creo Products Inc. 3700 Gilmore Way Burnaby, B.C. V5G 4M1 Canada for use with computer software for performing common workflow and raster image processor functions in digital imaging devices used in the pre press printing industry;
RUMBA INTERNET COMPANION Wall Data Incorporated 14828 NE. 95th St. Redmond WA 98052 use with computer software;
THE FUTURES GAME Cavlogix Corporation 2601 Elliot Avenue, Suite 1341 Seattle WA 98121 use with computer software for a commodities market trading simulation game;
TROY Security First Technologies 300 Virginia Avenue Pineville KY 40971 use with computer software and manuals sold as a unit for use in computer system and network security;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.