ARTIFICIAL INTELLIGENCE RULE BASED

Brand Owner (click to sort) Address Description
GFI AUREA SOFTWARE FZ-LLC Media City 706, Al Thuraya Tower-1 Dubai Arab Emirates Artificial intelligence and rule based systems comprised of computer software, namely, computer software and downloadable computer software for use in monitoring the access to the various web sites and data of others; computer software for use in alerting users when their information is being viewed by others, data management software; and, encryption and decryption software for use in limiting access to information, content, web sites, and data; computer software and downloadable computer software, namely, an e-mail utility for facilitating the use of disclaimers, virus checking, compression of attachments, archiving, anti-spam measures, content checking, security against offensive information, protection, tracking and identification of confidential information, personalized auto-replies with tracking numbers all with POP3, SMTP and proprietary mail system support; Computer software and downloadable computer software for use in transmitting and receiving electronic mail, namely, software for routing, replying, archiving, mailing, tracking and reporting electronic mail; Computer software and downloadable computer software, namely, software used on personal computers and networks to facilitate and automate the transmission, routing, receipt, storage, management, broadcasting, archiving, and annotation of electronic telecopier messages and documents;
GFI LANGUARD AUREA SOFTWARE FZ-LLC Media City 706, Al Thuraya Tower-1 Dubai Arab Emirates Artificial intelligence and rule based systems comprised of computer software and downloadable computer software, namely, computer software for use in monitoring the access to the various web sites and data of others; computer software and downloadable computer software for use in alerting users when their information is being viewed by others, data management software; and, encryption and decryption software and downloadable computer software for use in limiting access to information, content, web sites, and data; patch management software, namely, patch management software for operating systems, patch management software for third-party applications; software for assessment of network vulnerability; software for analyzing and auditing networks, namely, hardware and networking connections for connecting to a network; software for reporting information relating to a network connection and devices connected via a network;GFI LAN GUARD;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method of a rule-based operation can include the steps of dividing a design rule into at least one of three components including an application criteria, a rule condition, and an action. The method can further include the steps of expressing the design rule as a datafile or source code and binding the three components together to form a rule object at runtime.