COMPUTER SYSTEM SERVICES

Brand Owner (click to sort) Address Description
BT BEYONDTRUST BEYONDTRUST SOFTWARE, INC. 5090 N. 40th Street, Suite 400 Phoenix AZ 85018 Computer system services, namely, training services in the field of implementing and configuring privileged access and vulnerability management solutions;The mark consists of a single intertwined symbol comprised of the letters B and T to the left of the word BeyondTrust.;BT BEYOND TRUST;Color is not claimed as a feature of the mark.;Computer system design services; Computer network configuration services; Computer system services, namely, evaluation, design, installation, deployment and configuration services with respect to implementing privileged access and vulnerability management software systems; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the design and implementation of computer-based information systems and computer security solutions for businesses; Computer security consulting services in the field of privileged access and vulnerability management solutions;
FOURTH TIER Fourth Tier, Inc. 880 Apollo Ave, Suite 245 El Segundo CA 90245 COMPUTER SYSTEM SERVICES, NAMELY, DESIGNING COMPUTER SYSTEMS PROGRAMMING FOR OTHERS, DESIGNING COMPUTER HARDWARE AND PERIPHERALS FOR OTHERS;
HD SUPPLY CHAIN Xterprise Incorporated Suite 114 2304 Tarpley Road Dallas TX 75248 Computer system services, namely, designing, developing and integrating computers and other systems for supply chain management;
HDSC Xterprise Incorporated Suite 114 2304 Tarpley Road Dallas TX 75248 Computer system services, namely, designing and developing computer software systems for supply chain management, and integration of computer systems and readers for supply chain management;
HIGH DEFINITION SUPPLY CHAIN Xterprise Incorporated Suite 114 2304 Tarpley Road Dallas TX 75248 Computer system services, namely, designing and developing computer software systems for supply chain management, and integration of computer systems and readers for supply chain management;
OSCAR-1 TIME MANAGEMENT SOFTWARE, INC. 123 EAST BROADWAY CUSHING OK 74023 1;COMPUTER SYSTEM SERVICES;
RAIL MANAGEMENT SYSTEMS MATZA, JOHN R. 9750 ST. VINCENT SHREVEPORT LA 71106 COMPUTER SYSTEM SERVICES;
VISIBILITY. KNOWLEDGE. ACTION. BEYONDTRUST SOFTWARE, INC. 5090 N. 40th Street, Suite 400 Phoenix AZ 85018 Computer system services, namely, training services in the field of implementing and configuring privileged access and vulnerability management solutions;Computer system design services; Computer network configuration services; Computer system services, namely, evaluation, design, installation, deployment and configuration services with respect to implementing privileged access and vulnerability management software systems; Consulting services in the field of cloud computing; Consulting services in the field of design, selection, implementation and use of computer hardware and software systems for others; Consulting services in the design and implementation of computer-based information systems and computer security solutions for businesses; Computer security consulting services in the field of privileged access and vulnerability management solutions;
VISUAL PUBLIC SAFETY WTH Technology, Inc. 3665 Washington Blvd. Indianapolis IN 46205 Computer system services, namely, software design, software integration and computer consulting in the field of common visually organized software platforms for public safety analysis and response; Computer system services, namely consulting and design services that enhance public safety visual awareness by spatially organizing data from stored record databases, GIS software, dispatch software, automatic vehicle location software, telecommunications software, mobile software, cameras and sensors; Computer system services, namely, hosting the common visually organized software platforms of others for public safety analysis and response; Technical support services namely, troubleshooting of computer software problems in the field of common visually organized software platforms for public safety analysis and response; Consulting in the field of computer systems software for geospatial display, in international class 42;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A mechanism that enables flexible expansion of proxy firewall services is disclosed. In accordance with the present invention, the firewall system can be configured to include a dispatch host computer and one or more load host computers. Proxy firewall services can be provided by proxy applications that reside on either the dispatch host computer and/or the load host computers. In one embodiment, a load host computer can be configured to support multiple proxy applications. In other embodiments, a load host computer can be dedicated to a single resource intensive application. In this framework, a network administrator can flexibly decide how to accommodate the demand for proxy firewall services. Load hosts can be added or removed from the firewall system without disrupting ongoing security services. In one embodiment, this feature is enabled through the inclusion of a configuration file on the dispatch host computer that stores information relating to the load host computers in the firewall system.