COMPUTER SOFTWARE DATA SHARING

Brand Owner (click to sort) Address Description
HAND-HELD CITATION SENSCOM, Inc. 11750 Sorrento Valley Road, Suite 113 San Diego CA 92121 Computer software for data sharing, namely, providing secure access to data across a network of platforms, storage devices, and computer systems; and computer software for facilitating real-time mobile-to-mobile secure communications and secure access to data across a network of platforms, storage devices, and computer systems;
HAND-HELD INTELLIGENCE SENSCOM, Inc. 11750 Sorrento Valley Road, Suite 113 San Diego CA 92121 Computer software for data sharing, namely, providing secure access to data across a network of platforms, storage devices, and computer systems; and computer software for facilitating real-time mobile-to-mobile secure communications and secure access to data across a network of platforms, storage devices, and computer systems;HAND-HELD;
HAND-HELD MULTIMEDIA SENSCOM, Inc. 11750 Sorrento Valley Road, Suite 113 San Diego CA 92121 Computer software for data sharing, namely, providing secure access to data across a network of platforms, storage devices, and computer systems; and computer software for facilitating real-time mobile-to-mobile secure communications and secure access to data across a network of platforms, storage devices, and computer systems;
HAND-HELD QUERY SENSCOM, Inc. 11750 Sorrento Valley Road, Suite 113 San Diego CA 92121 Computer software for data sharing, namely, providing secure access to data across a network of platforms, storage devices, and computer systems; and computer software for facilitating real-time mobile-to-mobile secure communications and secure access to data across a network of platforms, storage devices, and computer systems;
HAND-HELD REPORTING SENSCOM, Inc. 11750 Sorrento Valley Road, Suite 113 San Diego CA 92121 Computer software for data sharing, namely, providing secure access to data across a network of platforms, storage devices, and computer systems; and computer software for facilitating real-time mobile-to-mobile secure communications and secure access to data across a network of platforms, storage devices, and computer systems;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for identifying dependencies of a software program installed on a host computer prior to duplication of the software program from the host computer to a destination computer and for adapting the identified dependencies to the destination computer after duplication. An installed software program can be copied from a host computer to a destination computer without breaking portions of the image that rely on data unique to the computer context in which the software program is installed. Data structures store functionality exposed by a software program during installation of the software program that captures machine-specific data before duplication so that such machine-specific data can be restored properly after the duplication. Software of the invention processes the information in the data structures before and after the duplication process to identify and adapt, respectively, the dependencies.