on 05 Nov 2024
Last Applicant/ Owned by
4141 Hacienda Drive
Pleasanton
CA
94588
Serial Number
97755401 filed on 16th Jan 2023
Registration Number
N/A
Correspondent Address
Stephen Jadie Coates
Filing Basis
1. filed as use application
2. use application currently
Disclaimer
NO DATA
Providing on-line non-downloadable software for administration of computer local area networks; providing on-line non-downloadable software for computer system and application development, deployment and management; providing on-line non downloadable software for bandwidth management, wireless network management, firewall log analysis, event log analysis, active directory management, network confi Read More
Providing on-line non-downloadable software for administration of computer local area networks; providing on-line non-downloadable software for computer system and application development, deployment and management; providing on-line non downloadable software for bandwidth management, wireless network management, firewall log analysis, event log analysis, active directory management, network configuration management, voice over IP monitoring, computer storage management, remote network management; Providing on-line non-downloadable software for administration, monitoring, and management of information technology, information technology infrastructure, computer networks, computer systems, computer devices, computer servers, software applications, information technology security systems, information technology help desk and technology support services, data, websites, and software; Providing on-line non downloadable software for accessing, modifying, and controlling information technology (IT), information technology (IT) infrastructure, computer networks, computer systems, computer devices, computer servers, software applications, information technology (IT) security systems, information technology (IT) help desk and technology support services, data, websites, and software; Providing on-line non downloadable software for remotely accessing, modifying, and controlling information technology (IT), information technology (IT) infrastructure, computer networks, computer systems, computer devices, computer servers, software applications, information technology (IT) security systems, information technology (IT) help desk and technology support services, data, websites, and software; Providing on-line non-downloadable software for providing information technology (IT) help desk and technology support services; Providing on-line nondownloadable software for managing and automating the information technology (IT) services of others; Providing on-line non-downloadable software for administration, monitoring, management and security of end point devices, computers, laptops, smart phones, tablets; Providing on-line nondownloadable software for the deep analysis and management of, and for responding to, incidents and events happening in the information technology (IT) infrastructure of others; Providing on-line non-downloadable software for data backup, recovery, restoration, and synchronization; Providing on-line nondownloadable software for the automation of administration, monitoring, and management of information technology (IT), information technology (IT) infrastructure, computer networks, computer systems, computer devices, security systems, computer servers, software applications, data, websites, and software; Providing on-line nondownloadable software for the administration, monitoring, management, assessment and quantification of computer security and data breach vulnerability risks; Providing on-line nondownloadable software for the remote deployment of software for others; Providing on-line non-downloadable software for governing, managing and monitoring access to privileged information; Providing on-line non-downloadable software for managing the public key cryptography infrastructure of others and the complete life cycle of encryption keys in the form of SSH keys, SSL certificates and tokens; Providing on-line nondownloadable software for performing analytics of data from the information technology infrastructure and applications of others; Providing on-line non-downloadable software for managing and securing browsers across networks; Providing online non-downloadable software for IT asset monitoring, management, auditing, and reporting for regulatory compliance purposes; Providing on-line nondownloadable software for operating system imaging and deployment; Providing on-line non-downloadable software for data loss prevention; Providing on-line non-downloadable software for data leak prevention; Providing on-line non-downloadable software for IT data analytics
27th Mar 2017
27th Mar 2017
Downloadable software for administration of computer local area networks; Downloadable software for computer system and application development,deployment and management; Downloadable software platforms for bandwidth management,wireless network management, firewall log analysis, event log analysis, active directory management, network configuration management, voice over IP monitoring, computer storage management, remote network management; Downloadable software for administration, monitoring, and management of information technology, information technology infrastructure, computer networks, computer systems, computer devices, computer servers, software applications, information technology security systems, information technology help desk and technology support services, data, websites, and software; Downloadable software for accessing, modifying, and controlling information technology (IT), information technology (IT) infrastructure, computer networks, computer systems, computer devices, computer servers, software applications, information technology (IT) security systems, information technology (IT) help desk and technology support services, data, websites, and software; Downloadable software for remotely accessing, modifying, and controlling information technology (IT), information technology (IT) infrastructure, computer networks, computer systems, computer devices, computer servers, software applications, information technology (IT) security systems, information technology (IT) help desk and technology support services, data, websites, and software; Downloadable software for providing information technology (IT) help desk and technology support services; Downloadable software for managing and automating the information technology (IT) services of others; Downloadable software for administration, monitoring, management and security of end point devices, computers, laptops, smart phones, tablets; Downloadable software for the deep analysis and management of, and for responding to, incidents and events happening in the information technology (IT) infrastructure of others; Downloadable software for data backup, recovery, restoration, and synchronization; Downloadable software for the automation of administration, monitoring, and management of information technology (IT), information technology (IT) infrastructure, computer networks, computer systems, computer devices, security systems, computer servers, software applications, data, websites, and software; Downloadable software for the administration, monitoring, management, assessment and quantification of computer security and data breach vulnerability risks; Downloadable software for the remote deployment of software for others; Downloadable software for governing, managing and monitoring access to privileged information; Downloadable software for managing the public key cryptography infrastructure of others and the complete life cycle of encryption keys in the form of SSH keys, SSL certificates and tokens; Downloadable software for performing analytics of data from the information technology infrastructure and applications of others; Downloadable software for managing and securing browsers across networks; Downloadable software for IT asset monitoring, management, auditing, and reporting for regulatory compliance purposes; Downloadable software for operating system imaging and deployment; Downloadable software for data loss prevention; Downloadable software for data leak prevention; downloadable computer software for IT data analytics
27th Mar 2017
27th Mar 2017
No 97755401
No Service Mark
No 10476
No
No
No
No
No
No
No
No
01.11.02 -
Partial moons, including half moons and crescent moons
26.01.03 -
Incomplete circles (more than semi-circles)
26.01.26 -
Spirals, coils and swirls
Status Date | Action Taken |
---|---|
05th Nov 2024 | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
05th Nov 2024 | PUBLISHED FOR OPPOSITION |
16th Oct 2024 | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
13th Sep 2024 | EXAMINERS AMENDMENT E-MAILED |
13th Sep 2024 | EXAMINER'S AMENDMENT ENTERED |
13th Sep 2024 | APPROVED FOR PUB - PRINCIPAL REGISTER |
13th Sep 2024 | EXAMINERS AMENDMENT -WRITTEN |
13th Sep 2024 | NOTIFICATION OF EXAMINERS AMENDMENT E-MAILED |
05th Sep 2024 | PREVIOUS ALLOWANCE COUNT WITHDRAWN |
27th Aug 2024 | WITHDRAWN FROM PUB - OG REVIEW QUERY |