DOWNLOADABLE INSTALLABLE COMPUTER SOFTWARE

Brand Owner (click to sort) Address Description
COLLECTIONCYCLE Eccentex Corporation 6101 W. Centinela Ave., Suite 110 Culver City CA 90230 Downloadable and installable computer software for use in web-based and off-line application to store, manage, track, analyze data, and create reports in the field of debt collections management, audit tracking and management, collection document generation and employee efficiency;COLLECTION CYCLE;Providing temporary use of on-line non-downloadable software for storing, managing, tracking, analyzing, and reporting data in the field of debt collections management, audit tracking and management, collection document generation and employee efficiency; providing temporary use of on-line non-downloadable software to facilitate communicating among peer professionals in debt collections management fields, and for customizing computer application user interfaces; computer services, namely, designing, developing, and maintaining computer software applications for others and consulting services related thereto.this does not include providing on-line computer games that are played on-line;
OVERWATCH Fractal Industries, Inc. 1775 Tysons Blvd., Suite 800 Tysons VA 22102 Downloadable and installable computer software, namely, agent software for cybersecurity monitoring and control of activities on a computer, antivirus software, simulation software used in the field of enterprise cybersecurity, graph-based database software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, kernel-level software for preventing actions by malware, malware incident forensics software, malware incident remediation software, rules-based decision support software used in the field of enterprise cybersecurity, neural network software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, temporal event capture, management, and analysis software used in the field of enterprise cybersecurity, risk quantification, mitigation, and management software, cyber decision platform software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, software for identifying actions in the nature of incident assessment, response, and remediation needed to optimize prevention and handling of cybersecurity incidents in the field of enterprise cybersecurity, and business analytics software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity;OVER WATCH;Providing software as a service (SaaS) services featuring software for cybersecurity monitoring and control of activities on a computer, antivirus scanning, computer virus characterization, remediation, and elimination, simulating large-scale processes in the field of enterprise cybersecurity, providing large-scale graph-based database services used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, providing malware incident forensics services, providing malware incident remediation services, providing rules-based decision support services in the field of enterprise cybersecurity, providing neural networks for use in analytics and planning in the field of enterprise cybersecurity, providing temporal event capture, analysis, and management services in the field of enterprise cybersecurity, providing risk quantification, mitigation, and management services in the field of enterprise cybersecurity, providing cyber decision platform services in the field of enterprise cybersecurity; providing services for identifying actions in the nature of incident assessment, response, and remediation needed to optimize prevention and handling of cybersecurity incidents, and providing business analytics functionality for the purpose of data-driven decision making and predictive analytics in the field of enterprise cybersecurity; providing professional consulting services pertaining to the deployment, configuration and optimization of software delivered from the cloud or deployed locally, namely, software for cybersecurity monitoring and control of activities on a computer, antivirus software, simulation software used in the field of enterprise cybersecurity, graph-based database software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, kernel-level software for preventing actions by malware, malware incident forensics software, malware incident remediation software, rules-based decision support software used in the field of enterprise cybersecurity, neural network software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, temporal event capture, management, and analysis software used in the field of enterprise cybersecurity, risk quantification, mitigation, and management software, cyber decision platform software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity, software for identifying actions in the nature of incident assessment, response, and remediation needed to optimize prevention and handling of cybersecurity incidents in the field of enterprise cybersecurity, and business analytics software used for data-driven decision making and predictive analytics in the field of enterprise cybersecurity;
POCKET PETS TM38 19 East Glenn Circle Media PA 19063 Downloadable and installable computer software programs for playing video games, social networking and for accessing and managing video game and social networking electronic data for cellular phones; Computer programs for playing video games and social networking; Electronic game programs for computers; Computer programs for cellular phones for playing video games and social networking; Downloadable computer software game programs for cellular phones for playing video games and social networking;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. There is disclosed an apparatus for controlling a physical layer interface of a network interface card. The apparatus comprises: 1) a read only memory (ROM) for storing an embedded control program; 2) a random access memory for storing a downloadable software control program; and 3) a microcontroller for controlling the physical layer interface, wherein the microcontroller in a first operating mode executes the embedded control program to thereby control the physical layer interface, and wherein the microcontroller in a second operating mode downloads the downloadable software control program from an external processing system and executes the software control program in place of the embedded control program to thereby control the physical layer interface.