MONITORING COMPUTER NETWORK SYSTEMS

Brand Owner (click to sort) Address Description
DATA RETURN TERREMARK WORLDWIDE, INC. One Biscayne Tower 2 S. Biscayne Blvd., Suite 2800 Miami FL 33131 Monitoring of computer network systems for security purposes;Technical consulting and research services in the fields of computer software, computer hardware and computer networks, namely, including virtual and physical infrastructure, servers, storage, networks; managed services and operations for others, namely, hosting, managing, administering and monitoring of virtual and physical infrastructure, servers, storage, networks, network security, software, recovery and backup of computer data; technical support services for virtual and physical infrastructure, namely, servers, storage, networks, and software; leasing and rental of computing capacity, namely, computer software, computer hardware and networking equipment;
NAP OF THE CAPITAL REGION TERREMARK WORLDWIDE, INC. One Biscayne Tower 2 S. Biscayne Blvd., Suite 2800 Miami FL 33131 Monitoring of computer network systems for security purposes;
SUMNER ONE SUMNERONE, INC. 6717 WALDEMAR AVENUE ST. LOUIS MO 63139 monitoring the computer network systems of others for technical purposes; consulting in the field of information technology and imaging technology; computer services, namely, cloud hosting provider services; computer disaster recovery planning; providing a website featuring technology that enables customers to submit their printer meter readings and view their printer meter history;
TERREMARK Terremark Trademark Holdings, Inc. 2 South Biscayne Blvd., Suite 2800 Miami FL 33131 Monitoring of computer network systems for security purposes;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Methods and systems are disclosed for a user to access an intranet from within a systems interface to back-end legacy systems. A user logs a computer into a systems interface which permits access to back-end legacy systems. The computer accesses the systems interface over a wireline or a wireless communications network. Preferably, the systems interface is located on at least a first network address. Preferably, the systems interface includes a first server with middleware for managing the protocol interface, the first server being located at the first network address. Preferably, the systems interface includes a second server for receiving requests and generating legacy transactions. When the user is logged on, a client application for the systems interface is running on the computer. Next, the user launches a shared network software application, preferably a browser. The user may or may not minimize the client application, but the user remains logged-on. As the browser launches and seeks out an intranet site at a separate network address, the systems interface receives a message from the computer or otherwise detects that the computer is seeking access to the intranet. In response to detecting that the computer seeks access to the internet, the systems interface determines whether intranet access is to be granted. If access is granted, the systems interface routes communications from the computer to the separate network address. Preferably, the first server routes communications from the computer from the first network address to the separate network address.