OPERATION COMPUTER NETWORKS

Brand Owner Address Description
THE PEOPLE BEHIND EGOVERNMENT NIC, INC. 25501 West Valley Parkway, Suite 300 Olathe KS 66061 Operation of computer networks for the electronic transmission of messages and data between government and citizens, businesses, or other governments, and consulting services related thereto;THE PEOPLE BEHIND ELECTRONIC GOVERNMENT;Operation of a business for others, namely, the operation of computer networks owned by others to conduct electronic government transactions and exchange information between government and citizens, businesses, or other governments; consulting services related thereto; computerized database management; business consulting services related to computerized database management; business consulting services related to back office computer systems integration services for government computer networks; providing a web site at which users can offer goods and services for sale and buy goods and services offered by others, in the field of government procurement; auctioneering services in the field of government procurement; Computerized on-line ordering services via a global computer information network in the field of government procurement, and consulting services related thereto;Back office computer systems integration services for government computer networks; computer services, namely, designing and developing software and computer networks for others for the purposes of conducting electronic transactions, exchanging information between government and citizens, businesses, or other governments, and for the purposes of computerized database management and back office computer systems integration; computer consulting services related to all the foregoing;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A system and method for monitoring remote computer access and associated costs is provided. The system includes a remotely located communication server in communication with multiple host computer networks and in communication with a network access server. First and second memory devices contain a list of authorized users for the host computer networks and a user log for use by a billing computer to generate bills. The method includes the steps of creating starting and ending time stamps for each authorized user accessing a respective one of the multiple host computer networks and creating a user log to generate bills and monitor host computer network usage.