COMPUTER SOFTWARE RECOVERY

Brand Owner (click to sort) Address Description
AURORA CFI/E-DISCOVERY Aurora Information Security & Risk 20th Floor 45 Rockefeller Center, 630 Fifth Avenue New York NY 10111 Computer software for recovery and organization of computer files for use in computer forensic investigations to obtain and secure relevant electronic evidence; e-Discovery and cyber forensics computer program; computer software, namely, litigation-support software for use in the legal field; computer software, namely, software for regulatory compliance management;Litigation consulting services; forensic evidence evaluation and analysis services; electronic discovery and investigation services, namely, reviewing electronically stored information that could be relevant in a lawsuit; litigation support services, namely, evidence evaluation, analysis services, electronic legal discovery and investigation services; providing a database in the legal field accessible over electronic or optical communications networks; legal research and services;CFI/E-DISCOVERY;Technology consultation in the field of computer forensics investigation; technology consultation in the field of the identification, collection and preservation of electronically stored information; providing temporary use of non-downloadable computer software for accessing, collecting, storing, organizing, aggregating, managing, and analyzing electronic documents and data for use in the legal field; providing temporary use of non-downloadable litigation-support computer software and computer software for regulatory compliance management; providing temporary use of nondownloadable computer software to create charts, graphs, statistical summaries and diagrams to visualize sequences of events for use in the legal field; providing temporary use of non-downloadable computer software to reconstruct complex evidence and sequences of events for use in the legal field;
FAST FILE UNDELETE dtidata.com, Inc 1155 Pasadena Ave S STE H S. Pasadena FL 33707 Computer software for recovery of files which have been deleted and emptied from or bypassed the Recycle Bin;
FORENSIKIT Carey Richard Murphey 5121 Valerie St. 5121 Valerie St. Bellaire TX 77401 Computer software for recovery and organization of computer files for computer forensic investigations, data recovery, and electronic discovery;FORENSIC KIT;
INAQUICK RESCUE INASOFT, INC. 2701 Loker Avenue West, Suite 290 Carlsbad CA 92008 computer software for the recovery of computer systems and files, protection against human error, virus attacks, crashes and freezes;
LSI STORAGE AUTHORITY LSI CORPORATION 1320 Ridder Park Drive San Jose CA 95131 Computer software for the recovery of data in an electronic data storage system; Computer software for the security of data in an electronic data storage system; Computer software for the acceleration of data inputs and outputs in an electronic data storage system;STORAGE;
MAILRETRIEVER Appassure Software, Inc. 1925 Isaac Newton Square East, Suite 440 Reston VA 20190 Computer software for the recovery of computer data;MAIL RETRIEVER;
RECOVER On Point Technology, Inc. Suite 810 4 Westbrook Corporate Center Westchester IL 60154 Computer software for recovery and collections management of unemployment insurance overpayments;
REDUNDEAD RED.COM 94 Icon Foothill Ranch CA 92610 Computer software for the recovery of computer data;REDUNDANT DEAD;
SYNAMATCH SynaPix, Inc. 650 Suffolk Street Lowell MA 01854 COMPUTER SOFTWARE FOR THE RECOVERY OF THREE DIMENSIONAL CAMERA MOVES AND SCENE GEOMETRY FROM FILM OR VIDEO FOR THE CREATION OF VISUAL EFFECTS;SYNA MATCH;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for obtaining software is disclosed. An operating environment of a first computer system is analyzed. A profile based on the operating environment is created. The profile is sent to a second computer system and the second computer system selects software based on the profile. The second computer forwards an indication of where the software is located and a software retrieval process is engaged. Software compatible with the profile is received.