PROVIDING COMPUTER PROGRAMMING SERVICES

Brand Owner (click to sort) Address Description
DRIPLICIOUS Neher & Co. Data Systems 15 Woodside Place Holmdel NJ 07733 Providing computer programming services to customers that enables them to provide video and audio content on their web sites;
IMPACT ZURYC, INC. 128 S. TRYON STREET CHARLOTTE NC 28202 providing computer programming services in the field of insurance;
N NORTHSTAR CONSULTANTS Northstar Consultants, Inc. 6409 Maplewood Avenue Falls Church VA 22041 providing computer programming services;
PICTURETISE CS Frontier 556 Commercial St. Unit 2 Boston MA 02109 Providing computer programming services to customers which enables them to provide information about the goods and services of others on their web sites;
PICTURETISING CS Frontier 556 Commercial St. Unit 2 Boston MA 02109 Providing computer programming services to customers which enables them to provide information about the goods and services of others on their web sites;
SMART ENGINE Sundown Group, Inc 2520 coral way 2091 Miami FL 33145 Providing computer programming services to customers that enables the customer's website to process natural language queries;
ZUMZING ZUMZING 2068 Aviano Way Charlottesville VA 229113555 Providing computer programming services to customers that enables them to provide video and audio content on their web sites; Providing graphic and multimedia design services for the purpose of promoting the goods and services of others;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method includes providing a programmable device, such as a mobile phone, having a plurality of operational modes and a key data, and providing a computer system having configuration data corresponding to the plurality of operational modes. An authorized portion of the configuration data corresponds to the key data and to at least one authorized operational mode of the mobile phone. The method further includes sending the key data from the mobile phone to the computer system over a data connection, then, activating the authorized configuration data at the computer system referencing the received key data, before finally, programming the mobile phone with the authorized configuration data through the data connection to enable a predetermined authorized operational mode. Protection from errors in programming and device cloning is insured, as the computer system is prevented from programming the mobile phone until receiving the key data from the mobile phone.