COMPUTER NETWORK OPERATING SYSTEM PROGRAMS

Brand Owner Address Description
5G. A FUTURE BEYOND IMAGINATION. Nippon Denki Kabushiki Kaisha (NEC Corporation) 7-1, Shiba 5-chome, Minato-ku Tokyo 108-8001 Japan Computer Network operating system programs; computer operating system software; electrical communication machines and instruments, namely, communications computers and communications servers; devices for wireless radio transmission; computer application software for transmitting and receiving data for use in Internet of Things (IoT); computer software and computer software platforms for wireless transferring of information; computer software, computer hardware and computer networking hardware for managing and operating information and communication platforms and networks; information and communications technology (ICT) platforms, namely, computer hardware and computer software platforms for creating, accessing, storing, transmitting, and manipulating information; ICT platforms comprised of computer hardware, computer software and computer firmware that uses a variety of sensors to collect data over wireless or wired networks; computer software for remotely communicating and interacting with internet of things (IoT) enabled devices; computer software for remotely controlling and managing internet of things (IoT) enabled devices; computer software to collect, manage, monitor, store, report and process data received from the internet of things (IoT) enabled devices; computer software for predicting analytics, real-time streaming of data and operating software for self-service tools for improving operational efficiencies for Internet of Things (IoT); computer hardware and computer software for data analysis using artificial intelligence; in International Class 009;Mobile radio communication services; mobile communications services in the nature of text messaging; mobile telephone communication; information, advisory and consultancy services relating to mobile communications, namely, transmission of voice, data, and documents via telecommunications networks; in International Class 038;FIVE G. A FUTURE BEYOND IMAGINATION.;5G;Designing of machines, apparatus, instruments including their parts or systems composed of such machines, apparatus and instruments; computer software design, computer programming, or maintenance of computer software; technological consultancy in the field of computer performance for automobiles and software for factory automation machines; data migration services; integration of computer systems and networks; design and development of computer software, systems and networks; providing information about the design and development of computer software, systems and networks; monitoring of computer systems by remote access to ensure proper functioning; development of software for secure network operations; consulting services in the field of design, selection, implementation and use of computer hardware, software systems and networks; consultancy relating to technology in the fields of information and communications technology; consulting services in the field of cloud computing; providing online non-downloadable computer software for data analysis and computation for use in the field of artificial intelligence; providing online non-downloadable computer software for transmitting and receiving data for use in Internet of Things; in International Class 042;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer system includes various security measures to insure that semi-permanent operating programs, such a boot blocks and firmware, are updated properly. For example, the system may include a security switch that can enable a host computer to load a replacement program into another computer, such as an appliance server for example, if the other computer fails. Also, if a replacement program is being loaded over a network connection that fails, the loading can resume automatically after re-establishment of the network connection. In addition, certain programs, such as boot blocks, may be verified in an execution memory, such as RAM, and loaded into a more permanent storage memory, such as ROM, only if verified.