SOFTWARE INSTALLATION

Brand Owner (click to sort) Address Description
HOW SOFTWARE GETS DOWN TO BUSINESS Marimba, Inc. 440 Clyde Avenue Mountain View CA 94043 software for installation, maintenance and transmission of data and software over a network, and for use by others to develop software;
MARIMBA Marimba, Inc. 440 Clyde Avenue Mountain View CA 94043 software for installation, maintenance and transmission of data and software over a network, and for use by others to develop software;
OFF-THE-SHELF SOLUTIONS OAK FINANCIAL SERVICES, INC. 340 West Butterfield Road Elmhurst IL 60126 software installation, maintenance and support services for automobile dealerships;
POWERED BY MARIMBA Marimba, Inc. 440 Clyde Avenue Mountain View CA 94043 software for installation, maintenance, and transmission of data and software over a network, and for use by others to develop software;
TAMBORA Zenplex, Inc. 317 Madison Avenue Suite 1500 New York NY 10017 software installation, customization and maintenance services;
TIMBALE Marimba, Inc. 440 Clyde Avenue Mountain View CA 94043 software for installation, maintenance and transmission of data and software over a network, and for use by others to develop software;
U-CONTROL Utelogy Corporation Suite B-201 2900 Bristol Street Costa Mesa CA 92626 Software for the installation and operation of audio equipment, video equipment and audiovisual systems;YOU-CONTROL;
UTELOGY Utelogy Corporation Suite B-201 2900 Bristol Street Costa Mesa CA 92626 Software for the installation, operation, maintenance and repair of audio equipment, video equipment and audiovisual systems;Computer services, namely, providing online non-downloadable software for others used for the installation, operation, maintenance and repair of audio equipment, video equipment and audiovisual systems;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. One embodiment of the present invention provides a system that facilitates software installation using embedded user credentials. The system receives a software installation package at a computer to be installed on the computer. The system then extracts an installation program from the software installation package. Next, the system determines if the current user has sufficient privileges to run the installation program. If not, the system recovers a set of user credentials from the software installation package that is associated with sufficient privileges to run the installation program. The system then authenticates to the computer using this set of user credentials. Finally, the system runs the installation program on the computer.