UNIX

Brand Owner (click to sort) Address Description
UIXE First Op International Inc. 14404 best Ave Santa Fe Springs, CA 90670 UNIX;The English translation of UIXE in the mark is Listen.;Bed frames; Beds; Beds, mattresses, pillows and bolsters; Bolsters; Bookcases; Chairs; Costume stands; Desks; Dressing tables; Filing cabinets; Furniture of metal; Inflatable furniture; Jewellery organizer displays; Kennels for household pets; Mattresses; Office furniture; Rattan; School furniture; Seats; Settees; Sideboards; Sofas; Tea tables; Television stands; Towel stands; Storage racks; Towel racks;
UNIX ADVANTAGE INMAC CORP. 2465 AUGUSTINE DR. SANTA CLARA CA 90031 UNIX;mail order and wholesale services in the sale and distribution of computers, computer software, computer peripherals, supplies and accessories; workstations; data communications equipment, and network and connectivity products; and consulting services relating to computers, computer software, data communications equipment, and network and connectivity products;
UNIX CURRENTS Sigs Publications, Inc. 71 West 23rd Street New York NY 10010 UNIX;computer services, namely, providing an online magazine about the development of computer software for the Unix platform and its integration with open systems;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A group manager module may provide the capability to segregate or associate files into file encryption groups. A file may be placed into a file encryption group based on the attributes of the file. The attributes may be characteristics/parameters that describe who has access to a file such as UNIX permission/mode bits (group-read/write/executable bit, owner-read/write/executable bits, users-read/write/executable bits) or other system for access control lists (ACLs). Once associated with a file encryption group, the file may be encrypted with the encryption (or write) key of the selected file encryption group, and thus, decrypted with the decryption (or read) key of the file encryption group. A user may have membership into multiple file encryption groups as long as the user possesses the appropriate read/write key pairs. Membership of a file in a file encryption group is determined automatically by the system based on the permission attributes assigned by the system-groups are not explicitly created by administrators or other centralized authority. It is not users that belong to groups based on their access rights, but files which belong to groups based on their permission attributes.