COMPUTER PROGRAMS DESIGNED ENABLE

Brand Owner (click to sort) Address Description
SWITCHBOARD Second Nature Software, Inc. 812 S.W. Washington, Suite 1020 Portland OR 97205 computer programs designed to enable users to organize program placement and visibility and to perform task management and other utility functions;
TEXTFLO Intelus Corp. 3204 Tower Oaks Boulevard Rockville MD 20852 computer programs designed to enable and facilitate the creation, storage, distribution, retrieval, use and overall management of word processing and electronic text-based documents and the distribution of such documents to mainframe, departmental, internal and external PC network, electronic mail and facsimile systems;text flow;
TEXTFLO Intelus Corp. 3204 Tower Oaks Boulevard Rockville MD 20852 computer programs designed to enable and facilitate the creation, storage, distribution, retrieval, use and overall management of word processing and electronic text-based documents and the distribution of such documents to mainframe, departmental, internal and external PC network, electronic mail and facsimile systems;TEXT FLOW;
VOICEFLO Intelus Corp. 3204 Tower Oaks Boulevard Rockville MD 20852 computer programs designed to enable and facilitate access to computer databases by means of vocal commands delivered through touch-tone telephones and the storage, indexing and retrieval of voice messages digitized onto optical disks;voice flow;
WORKSPACE Second Nature Software, Inc. 812 S.W. Washington, Suite 1020 Portland OR 97205 computer programs designed to enable users to organize program placement and visibility and to perform task management and other utility functions;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system includes various security measures to insure that semi-permanent operating programs, such a boot blocks and firmware, are updated properly. For example, the system may include a security switch that can enable a host computer to load a replacement program into another computer, such as an appliance server for example, if the other computer fails. Also, if a replacement program is being loaded over a network connection that fails, the loading can resume automatically after re-establishment of the network connection. In addition, certain programs, such as boot blocks, may be verified in an execution memory, such as RAM, and loaded into a more permanent storage memory, such as ROM, only if verified.