PROVIDING COMPUTER NETWORK SERVICES

Brand Owner (click to sort) Address Description
COMMERCE:COMPLETE STERLING SOFTWARE, INC. 300 Crescent Court, Suite 1200 Dallas TX 75201 providing computer network services for conducting business via electronic data interchange transactions and reports, E-mail messages, and providing references data via a network;
GRAND UNIFICATION THEORY ZeroDegrees, Inc. 8800 W. Sunset Boulevard West Hollywood CA 90069 Providing computer network services for use in relationship and social capital management, namely, for use in facilitating and enhancing person to person, person to business, and business to business networking;
GUT ZeroDegrees, Inc. 8800 W. Sunset Boulevard West Hollywood CA 90069 Providing computer network services for use in relationship and social capital management, namely, for use in facilitating and enhancing person to person, person to business, and business to business networking;
VEROSINT Take 2 Identity, Inc. 198 Zurga Lane Leander TX 78641 Providing computer network services for others, namely, risk scoring, fraud detection and identity transaction verification using a set of observable data (signals) attached to or associated with an identity (i.e. IP address, email address, phone number, username, etc.) which are curated into a system allowing decision making based on signal values while engaging a user online;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. Methods, systems, computer program products, and a method of doing business are disclosed for autonomically provisioning network-accessible services in a decentralized network having a federated grid infrastructure. Autonomic, grid, and web services-related technologies, standards, and concepts are leveraged. More particularly, web service behaviors (augmented as grid services, according to preferred embodiments) are autonomically provisioned (i.e., dynamically distributed) via a grid of hosting services. In preferred embodiments, this dynamic distribution occurs in response to (and as a function of) external catalysts, such as algorithms that monitor designated resources (e.g., to proactively determine when the commitments in a utility service provider's service level agreements are in jeopardy).