| TALKY Andyet LLC
85974930 01 Jul 2013 | on 19 Nov 2021 | Computer software for collaboration and communication that may be down... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Computer software for collaboration and communication that may be downloaded from a global computer network | | | &YET Andyet LLC
85974975 01 Jul 2013 | on 09 Apr 2021 | Computer software consultancy,Computer software consultancy Class 042 Class 042 Computer & Software Services & Scientific Services Computer software consultancy | | | AND YET Andyet LLC
86001869 03 Jul 2013 | on 12 Feb 2021 | Computer software consultancy,Computer software consultancy Class 042 Class 042 Computer & Software Services & Scientific Services AND YET | | | ^LIFT SECURITY Andyet LLC
86001858 03 Jul 2013 | on 24 Oct 2014 | Computer security consultancy in the field of scanning and penetration... Class 042 Class 042 Computer & Software Services & Scientific Services Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability | | | OTALK Andyet LLC
86091007 14 Oct 2013 | on 01 Oct 2014 | Downloadable computer software for enabling users to collaborate and c... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Downloadable computer software for enabling users to collaborate and communicate with one another | | | HUMAN JAVA SCRIPT Andyet LLC
86091057 14 Oct 2013 | on 01 Oct 2014 | Downloadable e-books in the field of computer programming,Downloadable... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Downloadable e-books in the field of computer programming | | | LIFT SECURITY Andyet LLC
86001847 03 Jul 2013 | on 14 May 2014 | Computer security consultancy in the field of scanning and penetration... Class 042 Class 042 Computer & Software Services & Scientific Services Computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability | |