| AWAKE AWAKE SPACE PBC
97074019 14 Oct 2021 | on 08 Nov 2022
| Bar services; Bar services featuring non-alcoholic beer, wine, spirits... Class 043 Class 043 Restaurant and Hotel Services Bar services; Bar services featuring non-alcoholic beer, wine, spirits; Bar and cocktail lounge services; Coffee bars; Coffee shops; Coffee-house and snack-bar services; Restaurant and bar services, including restaurant carryout services; Restaurant and bar services | | | AWAKE ARISTA NETWORKS, INC.
88349521 20 Mar 2019 | on 05 Oct 2021
| technical support and consulting services related to customizing, inst... Class 037 Class 037 Construction and Repair Services technical support and consulting services related to customizing, installing, maintaining and repairing cyber-security computer hardware systems for others Class 042 Class 042 Computer & Software Services & Scientific Services information technology troubleshooting, namely, investigation, research and diagnosis of computer system and computer network threats; Computer consultation in the field of computer security to detect and assess information security vulnerability; computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats, malware and unauthorized data and programs on computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; computer security services for protecting and managing enterprise networks; computer security services, namely, restricting and detecting unauthorized access to enterprise computer networks; technical support and consulting services related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; technical support and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security systems for others; technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; cloud computing services featuring software and databases for use in computer security and prevention and mitigation of computer risks; computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; application service provider (asp) featuring software for use for detection, blocking, and facilitating removal and remediation of viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; application service provider (asp) featuring software that provides secure virtual computer systems and virtual computing environments; providing temporary use of non-downloadable, artificial-intelligence based network security software that detects and prioritizes mal-intent and behavioral threats from internal and external sources and performs autonomous incident triage; providing temporary use of non-downloadable computer software for use in protecting and managing enterprise security; providing temporary use of non-downloadable computer software for digital security, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software and non-downloadable software platform, all for monitoring enterprise networks and computer systems to protect against malicious attacks; providing temporary use of non-downloadable computer software for monitoring data and communications for security purposes; providing temporary use of non-downloadable computer software for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for implementing computer, software and network security measures; providing temporary use of non-downloadable computer software for monitoring and detecting security breaches; providing temporary use of non-downloadable computer software that provides intrusion alert, threat protection and other security functions, all for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; providing temporary use of non-downloadable anti-malware software applications; providing temporary use of non-downloadable computer software for providing network, Internet, and computer security, namely, for detecting and removing network vulnerabilities and for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for scanning, detecting, remediating and removing viruses, worms, trojans, adware, spyware, rootkits, backdoors, zero-day attacks, data exfiltration, phishing, bots, time bombs, cyber-attacks, malicious attacks, advanced persistent threats and other malware; providing temporary use of non-downloadable Internet security software, namely, computer software for use in the monitoring and control of computer and online activity; providing temporary use of non-downloadable computer software for identifying and preventing malicious attacks on, and unauthorized activities and intrusions in computers, computer systems, networks, hardware, software applications, digital devices, and mobile devices; providing temporary use of non-downloadable computer software for providing access to secure networks; providing temporary use of non-downloadable computer software for enterprise network security analytics; providing temporary use of non-downloadable computer software for network traffic analysis; providing temporary use of non-downloadable computer software for network detection and response, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for threat investigations and incident response, namely, for detecting and removing network vulnerabilities for computer security and for protecting private information on enterprise networks; providing temporary use of non-downloadable computer software for threat hunting, namely, for searching through computer networks to detect and isolate network security threats | | | AWAKE ARISTA NETWORKS, INC.
88349525 20 Mar 2019 | on 17 Aug 2021
| On-line journals, namely, blogs in the field of information technology... Class 041 Class 041 Education and Entertainment Services On-line journals, namely, blogs in the field of information technology security and vulnerability Class 042 Class 042 Computer & Software Services & Scientific Services Providing information in the field of information technology security and vulnerability, including information related to security and vulnerability of, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices | | | AWAKE Crimo, Robert E.
87682773 13 Nov 2017 | on 13 Aug 2019
| Entertainment services in the nature of live musical performances,Down... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Entertainment services in the nature of live musical performances Class 041 Class 041 Education and Entertainment Services Downloadable musical sound recordings | | | AWAKE BRIGHTLAND INCORPORATED
88268020 18 Jan 2019 | on 30 Jul 2019
| Olive oil for food; Extra virgin olive oil for food Class 029 Class 029 Meats and Processed Food Products Olive oil for food; Extra virgin olive oil for food | | | AWAKE Market America, Inc.
86188895 10 Feb 2014 | on 08 May 2019
| Dietary supplements Class 005 Class 005 Pharmaceutical Products Dietary supplements | | | AWAKE TARTE, INC.
75010163 18 Oct 1995 | on 13 Feb 2018
| cosmetics and cosmetic soaps, namely, lipsticks and lip colors, eye sh... Class 003 Class 003 Cosmetics and Cleaning Products cosmetics and cosmetic soaps, namely, lipsticks and lip colors, eye shadows, eye pencils, mascara, cleansing creams, and gels, lotions, liquid exfoliant/moisturizer, eye cream, facial masks, foundation makeups with and without sunscreen, and face powder | | | AWAKE Advocates for Women's and Kids' Equality, Inc.
98073062 06 Jul 2023 | on 09 Jul 2024
| Promoting the interests of women's and kids' equality in Tennessee by ... Class 035 Class 035 Advertising, Business & Retail Services Promoting the interests of women's and kids' equality in Tennessee by means of public advocacy | | | AWAKE Twentieth Century Fox Film Corporation
85310251 02 May 2011 | on 11 Jul 2023
| Downloadable audio and video recordings featuring drama; downloadable ... Class 009 Class 009 Computer & Software Products & Electrical & Scientific Products Downloadable audio and video recordings featuring drama; downloadable television shows and video recordings featuring drama [ ; downloadable games via a global computer network and wireless devices ] | | | AWAKE AWAKE SPACE PBC
90343094 25 Nov 2020 | on 12 Oct 2021
| Coffee shops; Restaurant and bar services, including restaurant carryo... Class 043 Class 043 Restaurant and Hotel Services The mark consists of the design of a rising sun in gold, where there are gold dots at the tips of the sun's rays. Inside the sun is a gold curved line forming a semi-circle within the sun design. There is a stylized design of a gold eye within the curved line and also within the sun design. Below the aforementioned designs is the stylized white wording "AWAKE", where the horizontal lines in both letter "A"s are created by four gold dots arranged horizontally. The designs and wording are on a black background. | |