section 8
on 12 Mar 2021
Last Applicant/ Owned by
3554 CHAIN BRIDGE RD SUITE 402
FAIRFAX
VA
22030
Serial Number
86128910 filed on 25th Nov 2013
Registration Number
4579231 registered on 05th Aug 2014
Correspondent Address
Rhett V. Barney
Filing Basis
1. use application currently
Disclaimer
NO DATA
Computer education training services; Education services, namely, providing live and on-line continuing professional education seminars in the field of cyber security and data science; training in the field of cyber-security and data science systems, tools, software, and analytical techniques used in data science and cybersecurity, policies and procedures and how to evaluate and solve cyber securi Read More
Collection, compilation and systematization of data in a central file and computer databases for business purposes; management of computer files and computer databases; collection and systematization of data in computer databases for business purposes; compilation of statistics; compilation and providing of statistical information; business data analysis; consulting in the field of data processing; business management consulting; business management assistance to industrial or commercial companies regarding data analysis; commercial and industrial management assistance; business marketing and management analysis consulting; providing data analytical services for business purposes in the fields of market and industry comparisons, employee productivity, employee compensation, talent development, human resource targeting, customer needs and insights, competition pricing, customer behavior, digital knowledge intelligence and knowledge management, behavior analytics, motion analytics, geospatial analytics, and social network analysis
10th May 2013
10th May 2013
Computer education training services; Education services, namely, providing live and on-line continuing professional education seminars in the field of cyber security and data science; training in the field of cyber-security and data science systems, tools, software, and analytical techniques used in data science and cybersecurity, policies and procedures and how to evaluate and solve cyber security and data science problems
10th May 2013
10th May 2013
Data science services, namely, providing online, non-downloadable data analytical software for use with large amounts of data, including data mining across and within multiple data sources; Computer services, namely, acting as an application service provider in the field of information management; Hosting computer application software platforms to aggregate data and provide analysis and forecasting; Consultation services in the nature of data management, organization, and data valuation; Providing temporary use of on-line non-downloadable software for use in providing analysis of large amounts of data; Technical support and consulting services in the fields of computer security, vulnerability of computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices, and cyber-attacks and threats against computers, computer systems, networks, hardware, software applications, digital devices, digital data, and mobile devices; Technical and consulting services related to designing, developing, customizing, configuring, deploying, installing, maintaining, analyzing, integrating, repairing, and managing of cyber-security software systems for others; Technical support services in the nature of detecting and diagnosing computer hardware and software security problems and vulnerabilities, updating and maintenance of computer software relating to computer security and to prevention and mitigation of computer risks; Updating and maintaining computer software for others; Cloud computing services featuring online, non-downloadable software and databases for use in computer security and prevention and mitigation of computer risks; Computer consultation and research in the field of computer hardware, computer software and network security; Computer security consultancy in the field of malware, intrusion and penetration testing and diagnosis of computers and networks to assess information technology security and vulnerability; Information technology security services in the nature of providing cyber-threat intelligence, cyber-attack verification, and security analysis of network traffic, emails, files, media computer software, and mobile applications; Application service provider (ASP) featuring software for use for detection, blocking, and facilitating removal and remediation of computer viruses, rootkits, advanced persistent threats, malware and malicious attacks in computers, computer systems, networks, hardware, software applications, digital devices, and mobile digital devices; Application service provider (ASP) featuring software that provides secure virtual computer systems and virtual computing environments; Providing temporary use of on-line non-downloadable software for use in providing tools used for cyber-security
10th May 2013
10th May 2013
No 86128910
No Service Mark
No A065-0004TMU
No
No
No
No
No
No
No
No
Status Date | Action Taken |
---|---|
12th Mar 2021 | CANCELLED SEC. 8 (6-YR) |
05th Aug 2019 | COURTESY REMINDER - SEC. 8 (6-YR) E-MAILED |
25th Feb 2015 | AUTOMATIC UPDATE OF ASSIGNMENT OF OWNERSHIP |
05th Aug 2014 | REGISTERED-PRINCIPAL REGISTER |
20th May 2014 | OFFICIAL GAZETTE PUBLICATION CONFIRMATION E-MAILED |
20th May 2014 | PUBLISHED FOR OPPOSITION |
30th Apr 2014 | NOTIFICATION OF NOTICE OF PUBLICATION E-MAILED |
16th Apr 2014 | ASSIGNED TO LIE |
16th Apr 2014 | LAW OFFICE PUBLICATION REVIEW COMPLETED |
24th Mar 2014 | APPROVED FOR PUB - PRINCIPAL REGISTER |