DOWNLOADABLE SOFTWARE APPLICATIONS MANAGING

Brand Owner (click to sort) Address Description
BELLE Project Belle #300 1033 DEMONBREUN STREET Nashville TN 37203 Downloadable software applications for managing and scheduling personal care services by professionals who provide the services onsite; downloadable software in the nature of a mobile application for managing and scheduling personal care services by professionals who provide the services onsite;
BOSSX UNCOMMONX INC. 640 N. LaSalle Drive, Suite 592 Chicago IL 60654 Downloadable software applications for managing and operating software in the fields of data security, compliance assessment, and cybersecurity; Downloadable computer software for big data analysis; downloadable computer software for use in data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, and data analytics; downloadable computer software platforms for data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, and data analytics; downloadable cloud computer software for data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, and data analytics; downloadable computer software for application database integration; desktop and mobile computing and operating platforms consisting of data transceivers, wireless networks and gateways, for collection, analysis, sharing, interpretation and management of data;Business consulting services in the field of cybersecurity; Business risk assessment and management services; disaster recovery services, namely, business planning and business continuity consulting; business services, namely, formulation of best practices for cybersecurity; Arranging and managing subscriptions to online services, namely, subscriptions to software as a service (SAAS) in the field cybersecurity; Business data analytic services;Providing information in the field of computer security; Technology consultation and research in the field of cyber security, data and information security, and network security; Technical consulting services in the field of cyber security, namely, consulting regarding security architecture and information architecture; Managed computer security services in the nature of security information event management (SIEM) for use in electronic collection and analysis of real-time network information to managing and responding to security vulnerabilities and external threats; Computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and Internet security breaches; Computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; Technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, network devices, and mobile device security; Testing of computer software and computer networks relating to computer security and prevention of computer risks; Computer network security services, namely, restricting access to and by computer networks to and of undesired websites, media, devices, individuals and facilities, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon, providing network vulnerability testing and risk assessment services, network penetration and penetration mitigation services, and network monitoring and management, detection and reporting of malicious network activity; computer network security services to assist others in identifying and managing network security risks; computer network security services to assist others in locating and mitigating network security breaches; providing computer cyber security consultancy services; Software-as-a-Service (SaaS) services featuring software for configuring and controlling networks for cybersecurity and computer security purposes; Electronic data storage for archiving electronic data; Computer services, namely, computer security threat evaluation and analysis for protecting data to assure compliance with industry standards; Platform-as-a-service (PaaS) featuring computer software platforms for use in data management and data protection; Platform-as-a-service (PaaS) featuring computer software platforms being computer software development tools; Platform-as-a-service (PaaS) featuring computer software platforms for enabling data processing and data management; information technology consulting services; Design and Development of software in the field of cybersecurity and computer security; Providing temporary use of on-line non-downloadable software and platforms for use in data management, data storage, data backup, data protection, data migration, data archival, data analytics, data searching, data indexing, data retrieval, data reporting, data reduplication, data redundancy and data recovery and replication;
BUSINESS OPERATIONS SECURITY SUITE UNCOMMONX INC. 640 N. LaSalle Drive, Suite 592 Chicago IL 60654 Downloadable software applications for managing and operating software in the fields of data security, compliance assessment, and cybersecurity; Downloadable software applications in the field of cybersecurity, data protection, and computer security purposes; Downloadable computer software for big data analysis; downloadable computer software for use in data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, and data analytics; downloadable computer software platforms for data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, and data analytics; downloadable cloud computer software for data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, and data analytics; downloadable computer software for application database integration; desktop and mobile computing and operating platforms consisting of data transceivers, wireless networks and gateways, for collection, analysis, sharing, interpretation and management of data;Business consulting services in the field of cybersecurity; Business risk assessment and management services; disaster recovery services, namely, business planning and business continuity consulting; business services, namely, formulation of best practices for cybersecurity; Arranging and managing subscriptions to online services, namely, subscriptions to software as a service (SAAS) in the field cybersecurity; Business data analytic services;Computer network security services, namely, providing surveillance, monitoring, character recognition, search, review and replay capability of all activities and movement in a computer network in real-time and reordered for non-real-time review and replay for purposes of ensuring proper use for security purposes; consulting services in the field of maintaining the security and integrity of databases; Security services, namely, providing security risk assessments of physical locations, information systems, working environments and infrastructure, namely, desktops, servers, routers, network devices, databases and applications, and providing security in the nature of monitoring of the foregoing, for devices, online accounts and e-commerce transactions, and reporting of risk assessment levels related thereto, relating to property and personnel; security services, namely, providing security assessments for businesses and governmental agencies; Providing cyber security compliance services, namely, reviewing standards and practices to assure compliance with computer security and data privacy laws and regulations;Providing information in the field of computer security; Technology consultation and research in the field of cyber security, data and information security, and network security; Computer security consultation services, namely, consulting services in the field of computer security purposes and cyber security purposes; Technical consulting services in the field of cyber security, namely, consulting regarding security architecture and information architecture; Managed computer security services in the nature of security information event management (SIEM) for use in electronic collection and analysis of real-time network information to managing and responding to security vulnerabilities and external threats; Computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and Internet security breaches; Computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; Technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, network devices, and mobile device security; Testing of computer software and computer networks relating to computer security and prevention of computer risks; Design and development of security systems and contingency planning for information systems and computer network security; Computer network security services, namely, restricting access to and by computer networks to and of undesired web sites, media, devices, individuals and facilities, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon, providing network vulnerability testing and risk assessment services, network penetration and penetration mitigation services, and network monitoring and management, detection and reporting of malicious network activity; computer network security services to assist others in identifying and managing network security risks; computer network security services to assist others in locating and mitigating network security breaches; providing computer cyber security consultancy services; Intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for security purposes; Software-as-a-Service (SaaS) services featuring software for configuring and controlling networks for cybersecurity and computer security purposes; Electronic data storage for archiving electronic data; Computer services, namely, computer security threat evaluation and analysis for protecting data to assure compliance with industry standards; Platform-as-a-service (PaaS) featuring computer software platforms for use in data management and data protection; Platform-as-a-service (PaaS) featuring computer software platforms being computer software development tools; Platform-as-a-service (PaaS) featuring computer software platforms for enabling data processing and data management; information technology consulting services; Design and Development of software in the field of cybersecurity and computer security; Providing temporary use of on-line nondownloadable software and platforms for use in data management, data storage, data backup, data protection, data migration, data archival, data analytics, data searching, data indexing, data retrieval, data reporting, data deduplication, data redundancy and data recovery and replication;
FREDIO FREDIO, INC. c/o David H. Jaffer/Pillsbury et al. 2475 Hanover Street Palo Alto CA 943041114 Downloadable software applications for managing and watching video content that is run on internet-connected consumer electronics devices, namely, televisions, optical disk players, and game consoles;
INKPAY INKPAY PTY LTD C/- HALL CHADWICK LEVEL 4, 240 QUEEN STREET BRISBANE QLD 4000 Australia Downloadable software applications for managing payment of tattoo services; computer software, namely, downloadable computer programs and recorded computer software for the transfer of funds for the purposes of consumer payment plans to tattoo service providers; encoded cards for use in relation to the electronic transfer of funds for tattooist services; downloadable computer software to enable authoring, posting, uploading, downloading, transmitting, receiving, editing, extracting, encoding, decoding, playing, storing, organizing, showing, displaying, tagging, blogging, sharing or otherwise providing electronic media or information in relation to tattoo services over the internet or other communications network; downloadable application software used for managing debts payable for tattoo services; downloadable online personal hand-held computer application software for managing debts payable for tattoo services; downloadable electronic publications, namely, books in the field of tattoo services; computer software, namely, downloadable computer programs and recorded computer software for processing financial transactions in relation to payments for tattooist services;INK PAY;
KEY TO THE WORLD CURRENCY CARD FLIGHT CENTRE TRAVEL GROUP LIMITED 275 Grey Street South Brisbane, QLD 4101 Australia Downloadable software applications for managing travel arrangements and services and foreign currency exchange; magnetically encoded credit cards used for electronic transfer of funds and other financial transactions; magnetically encoded credit cards for use as credit cards; cash cards in the nature of magnetically encoded gift cards;Web portal services, namely, providing user access to a global computer network; providing user access to a global computer network and online sites containing information on a wide range of topics; providing user access to a global computer network and online sites containing information on travel arrangements and services and foreign currency exchange; information, consultancy and advisory services relating to all of the aforesaid;Electronic transfer of funds; foreign currency exchange; money brokerage in the nature of cash and foreign exchange transactions; banking services over the internet namely electronic banking via a global computer network; providing information, including online, about insurance, financial and monetary affairs; agency services for arranging travel insurance; information, consultancy and advisory services relating to all of the aforesaid; providing all the aforementioned services online;Color is not claimed as a feature of the mark.;CURRENCY CARD;Online provision of non-downloadable web-based applications for managing travel arrangements and services and foreign currency exchange; online provision of non-downloadable web-based software for managing travel arrangements and services and foreign currency exchange; information, consultancy and advisory services relating to all of the aforesaid; providing all the aforementioned services online;
UNCOMMONX UNCOMMONX INC. 640 N. LaSalle Drive, Suite 592 Chicago IL 60654 Downloadable software applications for managing and operating software in the fields of data security, compliance assessment, and cybersecurity; Downloadable software applications in the field of cybersecurity, data protection, and computer security for detecting and removing malicious code, and computer virus detection; Downloadable computer software for big data analysis; downloadable computer software for use in data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, and data analytics; downloadable computer software platforms for data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, and data analytics; downloadable cloud computer software for data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, and data analytics; downloadable computer software for application database integration; desktop and mobile computing and operating platforms consisting of data transceivers, wireless networks and gateways, for collection, analysis, sharing, interpretation and management of data;UNCOMMON;Business consulting services in the field of cybersecurity; Business risk assessment and management services; disaster recovery services, namely, business planning and business continuity consulting; business services, namely, formulation of best practices for cybersecurity; Arranging and managing subscriptions to online services, namely, subscriptions to software as a service (SAAS) in the field cybersecurity; Business data analytic services;consulting services in the field of maintaining the security and integrity of physical database hardware; security services for buildings and tangible property, namely, physical security risk assessments in the nature of monitoring and reporting the risk assessment levels of physical locations, information system hardware, physical working environments and physical infrastructure, namely, desktops, server hardware, router hardware, network devices, and database hardware; Security services, namely, providing security assessments for physical locations for businesses and governmental agencies; regulatory compliance consulting in the field of cyber security, namely, reviewing standards and practices to assure compliance with computer security and data privacy laws and regulations;Providing information in the field of computer security; Technology consultation and research in the field of cyber security, data and information security, and network security; Computer security consultation services, namely, consulting services in the field of computer security and cyber security ; Technical consulting services in the field of cyber security, namely, consulting regarding security architecture and information architecture; Managed computer security services in the nature of security information event management (SIEM) for use in electronic collection and analysis of real-time network information to managing and responding to security vulnerabilities and external threats; Computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and Internet security breaches; Computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; Technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, network devices, and mobile device security; Testing of computer software and computer networks relating to computer security and prevention of computer risks; Design and development of electronic data for security systems and contingency planning for information systems and computer network security; Computer network security services, namely, restricting access to and by computer networks to and of undesired web sites, media, devices, individuals and facilities, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon, providing network vulnerability testing and risk assessment services, network penetration and penetration mitigation services, and network monitoring and management, detection and reporting of malicious network activity; computer network security services to assist others in identifying and managing network security risks; computer network security services to assist others in locating and mitigating network security breaches; providing computer cyber security consultancy services; computer security services in the nature of intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for data security purposes; Software-as-a-Service (SaaS) services featuring software for configuring and controlling networks for cybersecurity and computer security purposes; Electronic data storage for archiving electronic data; Computer services, namely, computer security threat evaluation and analysis for protecting data to assure compliance with industry standards; Platform-as-a-service (PaaS) featuring computer software platforms for use in data management and data protection; Platform-as-a-service (PaaS) featuring computer software platforms being computer software development tools; Platform-as-a-service (PaaS) featuring computer software platforms for enabling data processing and data management; information technology consulting services; Design and Development of software in the field of cybersecurity and computer security; Providing temporary use of on-line nondownloadable software and platforms for use in data management, data storage, data backup, data protection, data migration, data archival, data analytics, data searching, data indexing, data retrieval, data reporting, data de-duplication, data redundancy and data recovery and replication; Computer network security services, namely, providing surveillance, monitoring, character recognition, search, review and replay capability of all activities and movement in a computer network in real-time and reordered for non-real-time review and replay for purposes of ensuring proper use for security of data and information from unauthorized access; consulting services in the field of data security, namely, maintaining the security and integrity of data stored within databases; computer data security services, namely, monitoring and reporting risk assessment levels related to data and information security for information systems, servers, routers, network devices, databases, applications, online accounts and ecommerce transactions; computer data security consulting services, namely, providing data security assessments for businesses and governmental agencies;
UNCOMMONX 5thColumn Inc. 640 N. LaSalle Drive, Suite 592 Chicago IL 60654 Downloadable software applications for managing and operating software in the fields of data security, compliance assessment, and cybersecurity; Downloadable software applications in the field of cybersecurity, data protection, and computer security for detecting and removing malicious code, and computer virus detection; Downloadable computer software for big data analysis; downloadable computer software for use in data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, and data analytics; downloadable computer software platforms for data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, and data analytics; downloadable cloud computer software for data integration, data warehousing, data mining, data processing, data sharing, data collection, data interpretation, data queries, data visualization, and data analytics; downloadable computer software for application database integration; desktop and mobile computing and operating platforms consisting of data transceivers, wireless networks and gateways, for collection, analysis, sharing, interpretation and management of data;UNCOMMON;Business consulting services in the field of cybersecurity; Business risk assessment and management services; disaster recovery services, namely, business planning and business continuity consulting; business services, namely, formulation of best practices for cybersecurity; Arranging and managing subscriptions to online services, namely, subscriptions to software as a service (SAAS) in the field cybersecurity; Business data analytic services;consulting services in the field of maintaining the security and integrity of physical database hardware; security services for buildings and tangible property, namely, physical security risk assessments in the nature of monitoring and reporting the risk assessment levels of physical locations, information system hardware, physical working environments and physical infrastructure, namely, desktops, server hardware, router hardware, network devices, and database hardware; Security services, namely, providing security assessments for physical locations for businesses and governmental agencies; regulatory compliance consulting in the field of cyber security, namely, reviewing standards and practices to assure compliance with computer security and data privacy laws and regulations;Providing information in the field of computer security; Technology consultation and research in the field of cyber security, data and information security, and network security; Computer security consultation services, namely, consulting services in the field of computer security and cyber security ; Technical consulting services in the field of cyber security, namely, consulting regarding security architecture and information architecture; Managed computer security services in the nature of security information event management (SIEM) for use in electronic collection and analysis of real-time network information to managing and responding to security vulnerabilities and external threats; Computer network security services and communications network security services in the nature of network intrusion protection, computer testing for vulnerability management and assessment, managing endpoint security on networks, data breach threat analysis, network threat analysis, computer incident response, network incident response, and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and Internet security breaches; Computer security consultancy in the field of scanning and penetration tests of computers and networks to assess information security vulnerability; Technology consultation and research in the fields of cyber security, computer software security, network security, digital devices, network devices, and mobile device security; Testing of computer software and computer networks relating to computer security and prevention of computer risks; Design and development of electronic data for security systems and contingency planning for information systems and computer network security; Computer network security services, namely, restricting access to and by computer networks to and of undesired web sites, media, devices, individuals and facilities, identifying, assessing, prioritizing and remediating security vulnerabilities, measuring security risks, analyzing security threats and reporting thereon, providing network vulnerability testing and risk assessment services, network penetration and penetration mitigation services, and network monitoring and management, detection and reporting of malicious network activity; computer network security services to assist others in identifying and managing network security risks; computer network security services to assist others in locating and mitigating network security breaches; providing computer cyber security consultancy services; computer security services in the nature of intrusion detection management, namely, providing onsite and remote monitoring of network infrastructure and network activity for data security purposes; Software-as-a-Service (SaaS) services featuring software for configuring and controlling networks for cybersecurity and computer security purposes; Electronic data storage for archiving electronic data; Computer services, namely, computer security threat evaluation and analysis for protecting data to assure compliance with industry standards; Platform-as-a-service (PaaS) featuring computer software platforms for use in data management and data protection; Platform-as-a-service (PaaS) featuring computer software platforms being computer software development tools; Platform-as-a-service (PaaS) featuring computer software platforms for enabling data processing and data management; information technology consulting services; Design and Development of software in the field of cybersecurity and computer security; Providing temporary use of on-line nondownloadable software and platforms for use in data management, data storage, data backup, data protection, data migration, data archival, data analytics, data searching, data indexing, data retrieval, data reporting, data de-duplication, data redundancy and data recovery and replication; Computer network security services, namely, providing surveillance, monitoring, character recognition, search, review and replay capability of all activities and movement in a computer network in real-time and reordered for non-real-time review and replay for purposes of ensuring proper use for security of data and information from unauthorized access; consulting services in the field of data security, namely, maintaining the security and integrity of data stored within databases; computer data security services, namely, monitoring and reporting risk assessment levels related to data and information security for information systems, servers, routers, network devices, databases, applications, online accounts and ecommerce transactions; computer data security consulting services, namely, providing data security assessments for businesses and governmental agencies;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A computer-implemented system for managing media that is used in the development of Web pages. A media managing software module supports the collection and storage of media for use by artists and writers in creating Web pages. The media managing software module further supports the delegation of tasks between artists and writers when creating Web pages. Writers can use the media managing software module to either insert media references into the Web page or to create specs requesting media. Artists can use the specs to create or locate needed media and associate the media with the request. The media managing software module can track of the status of requests for media and verify the availability of referenced media.