COMPUTER SOFTWARE APPLICATIONS DIRECT

Brand Owner (click to sort) Address Description
ACTIVEGUARD Solutionary, Inc. 1650 Farnam Street Omaha NE 68102 computer software applications for direct use or use in a service bureau environment, namely, computer software programs which provide for computer network, system and application security assessments and analysis; computer network, system and application security protection and security management; monitoring data communications on computer networks and systems; surveillance of computer networks' and systems' user traffic; privacy of data communications and transactions conducted on computer networks and systems; computer network, system and application intrusion detection, disablement, alerts and response; and management of secure computer networks, systems and applications; and computer software programs which monitor and assist companies with virus detection and removal and encryption and authentication of data;ACTIVE GUARD;
ACTIVEGUARD Solutionary, Inc. 1650 Farnam Street Omaha NE 68102 Computer software applications for direct use or use in a service bureau environment, namely, computer software programs which provide for computer network, system and application security assessments and analysis; computer network, system and application security protection and security management; monitoring data communications on computer networks and systems; surveillance of computer networks' and systems' user traffic; privacy of data communications and transactions conducted on computer networks and systems; computer network, system and application intrusion detection, disablement, alerts and response; and management of secure computer networks, systems and applications; and computer software programs which monitor and assist companies with virus detection and removal and encryption and authentication of data;ACTIVE GUARD;
ACTIVEGUARD INVESTIGATOR NTT SECURITY (US) INC. 9420 UNDERWOOD AVE. OMAHA NE 68114 computer software applications for direct use or use in a service bureau environment, namely, computer software programs which provide for computer network, system and application security assessments and analysis; computer software programs which monitor and assist companies with virus detection and removal and encryption and authentication of data; Computer software the protects the privacy of data communications and transactions conducted on computer networks and systems; computer software for computer network, system, and application intrusion detection and disablement in the nature of virus protection software;ACTIVE GUARD INVESTIGATOR;Computer network, system, and application security protection and security management services, namely, monitoring data communications on computer networks and systems for security purposes;INVESTIGATOR;Computer services, namely, monitoring of computer networks' and systems' user traffic for the purpose of quality control, namely, analyzing and reporting on the Internet traffic control and content control of the network and system; Providing online non-downloadable software that protects the privacy of data communications and transactions conducted on computer networks and systems; Computer services, namely, computer network, system and application intrusions detection, and disablement services in the nature of virus protection services; Computer network, system, and application security protection and security management services, namely, monitoring data communications on computer networks and systems to ensure proper technological functioning;
IT'S EASIER TO DESTROY THAN TO BUILD...WE PROTECT WHAT YOU BUILD Solutionary, Inc. 1650 Farnam Street Omaha NE 68102 Computer software applications for direct use or use in a service bureau environment, namely, computer software programs used to provide for computer network, system and application security assessments and analysis; computer software programs used for computer network, system and application security protection and security management; computer software for monitoring data communications on computer networks and systems; computer software used for surveillance of computer networks' and systems' user traffic; computer software used to protect the privacy of data communications and transactions conducted on computer networks and systems; computer software used for computer network, system and application intrusion detection, disablement, alerts and response; and computer software used for the management of secure computer networks, systems and applications; and computer software programs which monitor and assist companies with virus detection and removal and encryption and authentication of data;ITS EASIER TO DESTROY THAN TO BUILD WE PROTECT WHAT YOU BUILD; IT IS EASIER TO DESTROY THAN TO BUILD WE PROTECT WHAT YOU BUILD;
SOLUTIONARY Solutionary, Inc. 1650 Farnam Street Omaha NE 68102 computer software applications for direct use or use in a service bureau environment, namely, computer software programs which provide for computer network, system and application security assessments and analysis; virus detection and removal; computer network, system and application security protection, maintenance and management; monitoring data communications on computer networks and systems; encryption and authentication of data; surveillance of computer networks' and systems' user traffic; privacy of data communications and transactions conducted on computer networks and systems; computer network, system and application intrusion detection, disablement, alerts and response; detection, analysis and repair of computer software and hardware faults and performance; and management of secure computer networks, systems and applications;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A software resource manager is stored on a client computer and maintains a map of unique identifiers to resources, so as to determine those resources that are stored locally on the client computer and those resources that must be retrieved from a server system. The resource manager is further programmed to either pass the resources to one or more software applications, e.g. a toolbar application, or respond to a function call from the software application indicating that resources are needed. In this way, one or more software applications can be internationalized or customized without the need to distribute all of the resources for the application and without the need to restart the application.