COMPUTER SOFTWARE SCANNING IMAGES

Brand Owner (click to sort) Address Description
AUTHENTIC INDUSTRY365 UG Beckerstraße 13 09120 Chemnitz Germany Computer software for scanning images and documents; printers; printer programmes; image scanning apparatus;Data bank interconnection services;The color(s) blue, green is/are claimed as a feature of the mark.;Printing inks;
FIBRECODE Septillion Technologies Limited Kinburn Castle, St Andrews, KY169DR United Kingdom Computer software for scanning images and documents; Image scanning apparatus; Cryptography software; Utility, security and cryptography software;FIBRE CODE;
SCAN DIRECTOR METIS Systems S.r.l. Via del Fontanile Arenato, 295 I-00163 Rome Italy Computer software for scanning images, documents, materials and works of art; computer software for driving and managing image scanners; computer software for driving and managing digital cameras; computer software for driving and managing lighting systems for image scanners; computer software for the management of single or multiple scans of one or more originals;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Disclosed is a dynamically configurable threat scanning machine management system that utilizes a network to connect threat scanning machines with a central control computer. The central control computer can transmit, among other things, operational software and threat profiles to the threat scanning machines, while the threat scanning machines can transmit, among other things, images and performance data to the central computer. The threat scanning machine management system can be arranged in a hierarchical manner, which enables threat scanning machines at various locations to be connected into regional, national or international control centers for greater management efficiency. The network may be wireless and the control computer may be portable, enabling a supervisor to remotely manage the threat scanning machines while remaining mobile about the facility, or elsewhere. Additionally, the threat scanning machine management system can be accessed and monitored remotely from a web browser via secure Internet access.