DATA PROCESSING EQUIPMENT COMPUTER

Brand Owner (click to sort) Address Description
ANGELUS m.Doc GmbH Ursulaplatz 1 50668 Köln Germany Data processing equipment and computer programs for database management, use as a spreadsheet, word processing, and the operation of medical devices, all in the field of emergency care and first aid, as well as tablet PCs for providing instructions and support for medical emergency care and operation of first aid medical instruments;Telecommunications services and data transmission, namely, telecommunication access services and data transmission and reception services via telecommunication means for medical services;Medical apparatus, devices and instruments, namely, emergency care and first aid equipment, namely, thermometers, activity trackers, blood glucose meters, blood pressure monitors, gluco-monitoring systems, cardiovascular monitoring systems, pulse oximeters, pulse watches, ECGs, stethoscopes, lung monitors; medical emergency cases and bags holding medical instruments for first aid treatment specifically adapted for holding or carrying thermometers, activity trackers, blood glucose meters, blood pressure monitors, gluco-monitoring systems, cardiovascular monitoring systems, pulse oximeters, pulse watches, ECGs, stethoscopes and lung monitors;Scientific and technological services, namely, scientific research, analysis and testing in the field of emergency care and first aid; computer software advisory services; computer leasing; computer network configuration services; design and development of computer hardware and computer software;
CEPLUS SIEMENS AKTIENGESELLSCHAFT Werner-von-Siemens-Str. 1 München 80333 Germany Data processing equipment and computer programs for the control and operation of cranes; electrical and electronic control apparatus and instruments, namely, electronic controls for motors, Computer controls for the operation of machine tools, electronic crane load sensors for use in preventing overloading or turning over of construction cranes, Control system for the remote observation, management and operation of cranes, comprising computers, software, electromechanical controls, and video display screens; software for controlling industrial processes;Cranes and structural parts therefor;CE PLUS;Programming, design and development of computer software, in particular for the anti-sway control of cranes; engineering consultancy;
DEMAT'BOX SAGEMCOM DOCUMENTS SAS 250 Route de l'Empereur F-92500 Rueil Malmaison France Data processing equipment and computer equipment, namely, scanner connected to Internet, computer peripheral devices, scanners, document scanners, document scanners connected to the Internet, apparatus for data transmission via telecommunication networks, via the Internet or via Ethernet; computer software for use with scanners for processing images, use in database management, use as a spreadsheet, word processing, banking application, for use as an application selector in a carousel system able to implement further application, and for use in managing a software application store; computer software for the on-line processing, sending or storing of computer data;Telecommunication services, namely, transmission of all type of documents, providing user access to a global computer network; electronic bulletin board services; providing telecommunications connections to a global computer network; electronic messaging; rental of access time to global computer networks;Color is not claimed as a feature of the mark.;Computer data processing services;The wording DEMAT'BOX AND/OR DEMAT has no meaning in a foreign language.;Conversion of data or documents from physical to electronic media; electronic data storage services, development of image processing software, providing digitalization and dematerialization of documents; Integrating image processing software, namely, providing temporary use of an online non-downloadable software for image processing, namely, software that integrates image processing software for use in digitalization process for the digitalization and dematerialization of documents, providing temporary use of an online non-downloadable software which also integrates image processing software for use in digitalization process, rental of image processing software, design, development and rental of computer hardware and software for information technology processing;
DEMAT'BOX Sagemcom Germany GmbH Mergenthalerallee 55-59 65760 Eschborn Germany Data processing equipment and computer equipment, namely, scanner connected to Internet, computer peripheral devices, scanners, document scanners, document scanners connected to the Internet, apparatus for data transmission via telecommunication networks, via the Internet or via Ethernet; computer software for use with scanners for processing images, use in database management, use as a spreadsheet, word processing, banking application, for use as an application selector in a carousel system able to implement further application, and for use in managing a software application store; computer software for the on-line processing, sending or storing of computer data;Telecommunication services, namely, transmission of all type of documents, providing user access to a global computer network; electronic bulletin board services; providing telecommunications connections to a global computer network; electronic messaging; rental of access time to global computer networks;Color is not claimed as a feature of the mark.;Computer data processing services;The wording DEMAT'BOX AND/OR DEMAT has no meaning in a foreign language.;Conversion of data or documents from physical to electronic media; electronic data storage services, development of image processing software, providing digitalization and dematerialization of documents; Integrating image processing software, namely, providing temporary use of an online non-downloadable software for image processing, namely, software that integrates image processing software for use in digitalization process for the digitalization and dematerialization of documents, providing temporary use of an online non-downloadable software which also integrates image processing software for use in digitalization process, rental of image processing software, design, development and rental of computer hardware and software for information technology processing;
ELECTRONE Electrone Americas Limited (Company) 2920 NW Boca Raton Blvd, Suite 12 Boca Raton FL 33431 Data processing equipment and computer peripherals, namely, keyboards, trackballs, keypads, LCD panels and computer touchscreens; interactive stand-alone computer kiosks comprising computers, computer hardware, computer peripherals, computer operating software and computer programs for using the internet and the worldwide web, with customizable applications and solutions in various fields, namely, for use in monetary transactions in the nature of payment processing and for informational purposes, namely, self-service point-to-point directions, hospitality, entertainment and shopping information; custom data entry keypads and solutions, namely, bar-code scanners, bar-code printers, and magnetic encoded card readers; control devices for security cameras, namely, computer joystick and hardware mouse and software-based joystick and jotstick, namely, a computer joystick that functions like a hardware mouse, with and without user programmable functions keys, to control camera movement; point-of-sale devices and displays in the nature of point-of-sale terminals; and bags specially adapted for holding laptops and speakers;In the statement, Column 1, line 27,ANAYSIS should be deleted, and ANALYSIS should be inserted.;ELECTRON;Scientific and technological services and research and design relating thereto, namely, scientific and technological consulting, research and design in the field of information technology (IT) and computer hardware, computer peripherals and computer software; industrial analysis and research services, namely, industrial analysis, consulting and research in the field of information technology (IT) and computer hardware, computer peripherals, computer software and computer firmware for the operation of computer peripheral devices;
GTMS Gühring KG Herderstraße 50 - 54 Albstadt 72458 Germany Data processing equipment and computer and computer peripheral apparatus, interfaces for and parts of computers, computers consisting of the aforementioned goods; data carriers of all sorts, namely, computer operating software and computer programs for managing tools, measuring equipment and parts inventory, design, storage and control; electrical devices for remote control of administrative and industrial operations; computer software for the use and operation of an electronically operated tool output system for the stock control of tools and other consumable supplies, as well as peripheral apparatus, namely, in the form of screens and bar code readers;Technical consulting services in the field of tool design; engineering services, namely, technical consultation in the field of tool engineering and design, namely, testing and evaluation of tools and equipment to improve performance and efficiency; design and development of computer hardware and software; computer programming and updating of computer software;
HOVERSTOP Hoverstop Holding B.V. Broekermeerdijk 37C NL-1151 CZ Broek in Waterland Netherlands Data processing equipment and computer hardware, namely, mice, joysticks, keyboards, touchpads and mousepads and electric control panels;HOVER STOP;
HOVERSTOP Welbergen Beheer BV Broekermeerdijk 39 NL-1151 CZ Broek in Waterland Netherlands Data processing equipment and computer hardware, namely, mice, joysticks, keyboards, touchpads and mousepads and electric control panels;HOVER STOP;
IMEAS Wildner Programmsysteme GmbH Waakirchner Str. 11 81379 Munchen Germany Data processing equipment and computer hardware; computer software for computer operating programs, for word processing, for voice communications, for network multi-user, multi-line and communication management, for drag and drop functions, for E-commerce, for video conferencing;Telecommunication services, namely providing cellular telephone communication services, providing communication services, providing telecommunication connections to a global computer network, providing facsimile transmission services, radio and telephone paging services as well as video communication and conferencing services;Business management consulting, namely organization consulting for administration and clerical activities;Computer programming of others;
KEYLINUX KeyLinux, Inc. 1562 Centre Pointe Drive Milpitas CA 95035 Data processing equipment and computer with Linux operating system;KEY LINUX;computer programming and service;
MAGNA CARTA 800TH THE MAGNA CARTA TRUST Runnymede Borough Council Station Road, Runnymede Civic Centre Addlestone Surrey KT15 2AH United Kingdom Data processing equipment and computer; computer keyboards; computer memory; recorded computer operating programs; downloadable computer operating programs; computer peripheral devices; blank usb flash memory drives; blank magnetic data carriers, namely, recording discs, tapes and cards; blank recordable compact discs, dvds and other digital recording media, namely, blank USB drives; blank integrated circuit smart cards; integrated circuits; interfaces for computers; computer disc and solid state drives;Clothing, namely, shirts, coats, jackets, jumpers, trousers, pants, gloves and scarves; footwear, namely, socks, boots, and shoes; headgear, namely, hats;Color is not claimed as a feature of the mark.;Household or kitchen containers; beer mugs; bottle openers; busts of porcelain, ceramic, earthenware or glass; china ornaments; cups; decanters; drinking glasses; mugs; statuettes of porcelain, ceramic, earthenware or glass;
MSOC ON2IT B.V. Hogeweg 35 LJ Zaltbommel 5301 Netherlands Data processing equipment and computer software for the purpose of cyber security; computer virus scanning and blocking software; security log file analyzing software computer software platforms for cyber security and information technology security; computer software for enterprise vulnerability management or remediation and security accreditation or certification, namely, software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation or certification; computer software consisting of internet and telecommunications based applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches and advances persistent threat attacks; downloadable computer software and software applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks;Development and design of computer software in the field of cyber security and secure network operations; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; maintenance and updating of computer software in the field of cyber and computer security; maintenance and updating of computer software for preventing risks in online environments and computer networks; data and internet and computer security consultancy services; data and internet and computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites and cloud environments, administering digital certificates; computer security threat analysis for protecting data; information technology security support services, namely, keeping data and applications secure and keeping data compliant with national and international privacy regulations, offering visibility and control of data; computer security services, namely, analyzing services of data traffic in computer networks; information technology consultancy services, namely, consultation in the field of assessing, correcting and managing computer network vulnerabilities and security operations, regulatory compliance, risk management, corporate governance, network certification and accreditation and cyber security; data security services; computer security system monitoring services; computer security services, namely, analysis of computers and networks to assess information security vulnerability and cyber threats; computer security services, namely, development of customized plans for improving computer security and preventing wrongful or risky activity; research in the field of cyber intelligence technology and cyber security technology; software-as-service (SaaS) or application service provider services (ASP), namely, hosting software applications for others in the field of analysis of computers and networks to assess information security vulnerability and cyber threats;
NOXTURNAL Nox Medical ehf Katrinartuni 2 Reykjavik IS-105 Iceland Data processing equipment and computer software, namely, analysis software for medical diagnostics;NOX NOCTURNAL;Medical and dental apparatus and instruments, namely, medical diagnostics apparatus for diagnosing sleep issues and disorders;
ON2IT ON2IT B.V. Hogeweg 35 LJ Zaltbommel 5301 Netherlands Data processing equipment and computer software for the purpose of cyber security; computer virus scanning and blocking software; security log file analysing computer software platforms for cyber security and information technology security; computer software for enterprise vulnerability management or remediation and security accreditation or certification, namely, software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation or certification; computer software consisting of internet and telecommunications based applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks; downloadable computer software and software applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks;Telecommunication services, namely, establishing telecommunications connections to computer networks or cloud environments, provision of online communications services via computer networks, mobile networks, Internet or cloud environments, electronic mail, message sending and receiving services; transmission and distribution of data via computer networks, mobile networks, Internet or cloud environments;ON TO IT;Development and design of computer software in the field of cyber security and secure network operations; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; maintenance and updating of computer software in the field of cyber and computer security; maintenance and updating of computer software for preventing risks in online environments and computer networks; data and internet and computer security consultancy services; data and internet and computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites and cloud environments, administering digital certificates; computer security threat analysis for protecting data; information technology security support services, namely, keeping data and applications secure and keeping data compliant with national and international privacy regulations, offering visibility and control of data; computer security services, namely, analyzing services of data traffic in computer networks; information technology consultancy services, namely, consultation in the field of assessing, correcting and managing computer network vulnerabilities and security operations, regulatory compliance, risk management, corporate governance, network certification and accreditation and cyber security; data security consultancy services; computer security system monitoring services; computer security services, namely, analysis of computers and networks to assess information security vulnerability and cyber threats; development of customized plans for improving computer security and preventing wrongful or risky activity; research in the field of cyber intelligence technology and cyber security technology; software-as-service (SaaS) or application service provider services (ASP), namely, hosting software applications for others in the field of analysis of computers and networks to assess information security vulnerability and cyber threats;
ON2IT MSOC ON2IT B.V. Hogeweg 35 LJ Zaltbommel 5301 Netherlands Data processing equipment and computer software for the purpose of cyber security; computer virus scanning and blocking software; security log file analyzing computer software platforms for cyber security and information technology security; computer software for enterprise vulnerability management or remediation and security accreditation or certification, namely, software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation or certification; computer software consisting of internet and telecommunications based applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advances persistent threat attacks; downloadable computer software and software applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks;ON TWO IT MSOC; ON TO IT MSOC;Development and design of computer software in the field of cyber security and secure network activities; Computer security services, namely, providing, restricting and managing access rights for users of computer resources for cloud, mobile or network resources based on attributed references; Maintenance and updating of computer software in the field of cyber and computer security; Maintenance and updating of computer software for preventing risks in online environments and computer networks; Data and internet and computer security consultancy; Data and internet and computer security services, namely, restriction of unauthorised access to hard drives, computer networks, websites and cloud environments, digital certificate management; Analysis of computer security threats for protecting data; IT security support services, namely, keeping data and applications secure and maintaining compliance of data with national and international privacy regulations, resulting in data visibility and accountability; Analysis of data traffic on computer networks; Consultancy in the field of information technology, namely, advice in the field of evaluating, correcting and managing vulnerabilities in computer networks and security activities, compliance with legislation and regulation, risk management, corporate governance, network certification and accreditation and cyber security; Data security services; Computer security system monitoring services; Analysis of computers and networks for evaluating vulnerability to information security and cyber threats; Development of customised plans for improving computer security and preventing unlawful or risky activities; Research in the field of cyber intelligence technology and cyber security technology; Software as a service (SaaS) or application service provider (ASP) services, namely, hosting of software applications, for others, in the field of computer and network analysis for evaluating the vulnerability of information security and cyber threats;
QOSMOS SAM Qosmos Tech 8 rue bernard buffet Immeuble le cardine F-75017 PARIS France Data processing equipment and computer equipment, namely, hardware running the software for inspecting traffic on electronic communication networks, with a view to organizing flows through the description of different protocols and relevant metadata; software, namely, recorded computer operating programs; software for inspecting traffic on electronic communication networks, with a view to organizing flows through the description of different protocols and relevant metada; software module, used for inspecting traffic on electronic communication networks, with a view to organizing flows through the description of different protocols and relevant metadata; all for customers from industry, government and those involved in wholesale trade, excluding end consumers;Information regarding telecommunications; communications via computer terminals or fiber-optic networks;The wording QOSMOS SAM has no meaning in a foreign language.;Evaluations analyses and research in the field of science and technology provided by engineers, namely, computer engineering; design and development of computers and software; design, development, installation, maintenance, updating or rental of software; computer programming; all for customers from industry, government and those involved in wholesale trade, excluding end consumers;
RHODIA RHODIA 25 rue de Clichy F-75009 PARIS France [data processing equipment and computer hardware, recorded computer software for industrial use; protective clothing, namely, clothing for screening against heat, fire, chemical risks and radiation];asbestos fabric for use in cable insulation, asbestos for use in the manufacture of brake linings, asbestos packing for valves and pistons, asbestos safety screens for firemen; latex for general industrial use and/or for use as insulating materials and/or for use as waterproofing and/or protective materials, mica for use in the manufacture of insulating materials, rubber for general industrial use; rubber in bars, blocks, pellets, rods, sheets and tubes for general industrial use, rubber sealant for caulking and adhesive purposes; gutta percha, xathane gum, guar, guar derivatives, plastics in extruded form for use in manufacture, plastics in granular form used for transformation by molding and extrusion, plastic in bars, blocks, pellets, rods, sheets and tubes for general industrial use;[ carpets, rugs, mats and matting, namely, doormats of textile, floor mats for vehicles, antistatic mats; linoleum and other similar materials for use on existing floors, insulating materials for covering existing floors; non-textile wall hangings; fitted carpets ];[ lace trimming; embroidery; braids, ribbons; ornamental novelty buttons; buttons for clothing; hooks and eyes ];bleaching preparations for laundry; soaps, namely, deodorant soaps, detergent soaps, shaving soaps, skin soaps, toilet soaps, and liquid soaps for skin and toilet, perfume; essential oils for use in food flavoring, for personal use and for use in the chemical industry; dentrifices; cosmetics, namely, body creams, cold creams, eye creams, hair removing creams, hand creams, night creams, skin cleansing creams and vanishing creams, body lotions, facial lotions, hair lotions, hair waving lotions, and skin lotions, [baby oil, bath oil, body oil and massage oil, baby powder, bath powder, body powder, face powder, non-medicated foot powder and talcum powder, non-medicated bath salts, bath gels, shower gels ] and hair gels;clothing, namely, shirts and short-sleeve shirts, suits, dresses, skirts, shorts, pajamas, trousers, teeshirts, pullovers, parkas, coats, jackets, dressing gowns, gym suits, jogging suits, playsuits, ski suits, snow suits, sweat suits, warm-up suits and swimsuits, golf shirts, knit shirts, polo shirts, sport shirts and sweat shirts, foul weather gear, lingerie, underwear, hosiery, undergarments, bras, slips, stockings, socks, tights, pantyhose, body shapers, body suits, corselets, business suits, uniforms, vests, overalls, waistcoats, cardigans, gloves, footwear, headwear;[ tobacco; matches; ashtrays not of precious metal; filter tips for cigarettes, cigars and pipes; filter tipped cigarettes, cigars and pipes; cigarette rolling papers; cigarette lighters not for land vehicles or of precious metal; tobacco substitutes, namely, herbs for smoking ];[apparatus for lighting, heating, steam generating, cooking, refrigerating, drying, ventilating, water supply and sanitary purposes];ropes, string commercial fishing nets, commercial nets, camouflage nets for visual and radar uses; tents, sails, awnings, carbon or glass fibers for textile use; wadding for padding and stuffing; raw fibrous textile materials containing fibers, acrylic fibers, coconut fibers, polyester stuffing fibers, polyester fibers, raffia fibers, ramie fibers, sissal fibers, synthetic fibers, textile fibers, yarn fibers;[surgical, medical, dental and veterinary apparatus and instruments, artificial limbs, eyes and teeth; orthopedic articles; suture materials];
THE NODE CONNECTION CLAREMONT TECHNOLOGY GROUP, INC. 1600 NW Compton Dr. Beaverton OR 97006 data processing equipment and computer components, namely file servers and hard drives;ISSUE NEW CERTIFICATE TO: Claremont Technology Group, Inc., 1600 NW Compton Dr., Beaverton OR 97006, Oregon Corporation;NODE;computer network architectural design, engineering and consulting services;
ZERO TRUST FITNESS ON2IT B.V. Hogeweg 35 LJ Zaltbommel 5301 Netherlands Data processing equipment and computer software for the purpose of cyber security; computer virus scanning and blocking software; security log file analyzing software computer software platforms for cyber security and information technology security; computer software for enterprise vulnerability management or remediation and security accreditation or certification, namely, software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation or certification; computer software consisting of internet and telecommunications based applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches and advances persistent threat attacks; downloadable computer software and software applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks;ZERO TRUST;Development and design of computer software in the field of cyber security and secure network operations; computer security services, namely enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; maintenance and updating of computer software in the field of cyber and computer security; maintenance and updating of computer software for preventing risks in online environments and computer networks; data and internet and computer security consultancy services; data and internet and computer security services, namely restricting unauthorized access to hard drives, computer networks, websites and cloud environments, administering digital certificates; computer security threat analysis for protecting data; information technology security support services, namely keeping data and applications secure and keeping data compliant with national and international privacy regulations, offering visibility and control of data; computer security services, namely analyzing services of data traffic in computer networks; information technology consultancy services, namely, consultation in the field of assessing, correcting and managing computer network vulnerabilities and security operations, regulatory compliance, risk management, corporate governance, network certification and accreditation and cyber security; data security services; computer security system monitoring services; computer security services, namely analysis of computers and networks to assess information security vulnerability and cyber threats; computer security services, namely development of customized plans for improving computer security and preventing wrongful or risky activity; research in the field of cyber intelligence technology and cyber security technology; software-as-service (SaaS) or application service provider services (ASP),namely hosting software applications for others in the field of analysis of computers and networks to assess information security vulnerability and cyber threats;
ZERO TRUST READINESS ON2IT B.V. Hogeweg 35 LJ Zaltbommel 5301 Netherlands Data processing equipment and computer software for the purpose of cyber security; computer virus scanning and blocking software; security log file analyzing computer software platforms for cyber security and information technology security; computer software for enterprise vulnerability management or remediation and security accreditation or certification, namely, software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation or certification; computer software consisting of internet and telecommunications based applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advances persistent threat attacks; downloadable computer software and software applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks;Development and design of computer software in the field of cyber security and secure network operations; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; maintenance and updating of computer software in the field of cyber and computer security; maintenance and updating of computer software for preventing risks in online environments and computer networks; data and internet and computer security consultancy services; data and internet and computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites and cloud environments, administering digital certificates; computer security threat analysis for protecting data; information technology security support services, namely, keeping data and applications secure and keeping data compliant with national and international privacy regulations, offering visibility and control of data; computer security services, namely, analyzing services of data traffic in computer networks; information technology consultancy services, namely, consultation in the field of assessing, correcting and managing computer network vulnerabilities and security operations, regulatory compliance, risk management, corporate governance, network certification and accreditation and cyber security; data security services; computer security system monitoring services; computer security services, namely, analysis of computers and networks to assess information security vulnerability and cyber threats; computer security services, namely, development of customized plans for improving computer security and preventing wrongful or risky activity; research in the field of cyber intelligence technology and cyber security technology; software-as-service (SaaS) or application service provider services (ASP), namely, hosting software applications for others in the field of analysis of computers and networks to assess information security vulnerability and cyber threats;
ZERO TRUST SOC ON2IT B.V. Hogeweg 35 LJ Zaltbommel 5301 Netherlands Data processing equipment and computer software for the purpose of cyber security; computer virus scanning and blocking software; security log file analyzing computer software platforms for cyber security and information technology security; computer software for enterprise vulnerability management or remediation and security accreditation or certification, namely, software for assessing and correcting computer network vulnerabilities and for automating, managing and monitoring regulatory compliance, risk management, corporate governance and security accreditation or certification; computer software consisting of internet and telecommunications based applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advances persistent threat attacks; downloadable computer software and software applications for cyber security for the detection, analysis and mitigation of computer viruses, malware, network anomalies, security breaches, and advanced persistent threat attacks;SOC;Development and design of computer software in the field of cyber security and secure network operations; computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; maintenance and updating of computer software in the field of cyber and computer security; maintenance and updating of computer software for preventing risks in online environments and computer networks; data and internet and computer security consultancy services; data and internet and computer security services, namely, restricting unauthorized access to hard drives, computer networks, websites and cloud environments, administering digital certificates; computer security threat analysis for protecting data; information technology security support services, namely, keeping data and applications secure and keeping data compliant with national and international privacy regulations, offering visibility and control of data; computer security services, namely, analyzing services of data traffic in computer networks; information technology consultancy services, namely, consultation in the field of assessing, correcting and managing computer network vulnerabilities and security operations, regulatory compliance, risk management, corporate governance, network certification and accreditation and cyber security; data security services; computer security system monitoring services; computer security services, namely, analysis of computers and networks to assess information security vulnerability and cyber threats; computer security services, namely, development of customized plans for improving computer security and preventing wrongful or risky activity; research in the field of cyber intelligence technology and cyber security technology; software-as-service (SaaS) or application service provider services (ASP), namely, hosting software applications for others in the field of analysis of computers and networks to assess information security vulnerability and cyber threats;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A monitoring system is provided for remotely monitoring in-store equipment. A controller is provided in each store for monitoring and controlling in-store equipment. A monitoring computer is connected to the controller in each store through a communication line. The controller includes data transmission means for transmitting to the monitoring computer data related to each in-store equipment and predetermined measurement data, and display means for displaying power saving advice information fed from the monitoring computer, and the monitoring computer comprising power saving advice information production means for producing power saving advice information for efficiently operating each in-store equipment on the basis of the data received from the controller, and power saving advice information transmission means for transmitting to the controller the produced power saving advice information.