DATA LOGGERS

Brand Owner (click to sort) Address Description
DATAHUB BY PREDICTWIND PREDICTWIND LIMITED 198 Riverside Avenue, Point England Auckland 1072 New Zealand Data loggers; data processing apparatus; computer data storage devices; data retrieving devices; data sets, recorded or downloadable; data storage apparatus; digital data recording media; data transmission cables; electronic data communication apparatus; electronic data processing apparatus; Global Positioning System apparatus; smart home hubs; communication hubs; network hubs; computer network hubs, switches and routers; transmitting apparatus for telecommunications; data communication apparatus that transmit data and information to databases; electronic apparatus for providing communication links; electronic navigating apparatus; electronic navigation apparatus; long range navigation devices;Streaming of data; providing telecommunications connections to a global computer network; providing user access to global computer networks; providing remote internet access; wireless cell phone services; wireless transfer of data via the internet; computer communication and internet access; providing access to mobile internet portals; providing multiple user wireless access to the internet; satellite communication; transmission of information via wireless or cable networks; mobile radio telephone services; wireless electronic transmission of data; internet access services; telecommunication; data transmission; digital data transfer;DATA HUB BY PREDICT WIND;
ESERVER Veris Industries 10831 SW Cascade Blvd. Portland OR 97223 Data loggers, namely, devices for receiving, compiling, and periodically communicating data regarding energy usage, via cables and digital communication links, including modems;ENTRY SERVER;
METROLOGGER Metrosonics, Inc. P.O. Box 23075 Rochester NY 14618 DATA LOGGERS;
SAPORO ORDER IN CHAOS Saporo SA Rue du Port-Franc 22 CH-1003 Lausanne Switzerland Data loggers, namely, computer hardware and software for data collection and maintenance, downloadable computer security software; computer peripheral devices for security applications on the Internet, on computer and communication networks and for computers; electric or electronic apparatus, instruments and equipment enabling monitoring, detecting and analyzing and combatting intrusions or attempted intrusions of computers and/or on networks; data processing equipment and computers; database and application integration software; data search software; database management software; data processing programs; downloadable software for remote monitoring and analysis; software for content filtering and inspection, access management, authorization management and monitoring concerning the use of the Internet; computer security software; software, electronic and computer equipment and computer systems for collecting, storing, processing, managing, encrypting and decrypting data; software, electronic and computer equipment and computer systems for protecting and securing the integrity of data and preventing data loss; electronic device for access, authentication or authorization control;The color(s) orange and black is/are claimed as a feature of the mark.;Commercial management; commercial business administration, organization and management; data collection and processing services relating to the security of computers, computer and communication networks and computer systems, data encryption and decryption, access management, authorization management and monitoring of the use of the Internet, decisions and advice in the event of detection of intrusions or intrusion attempts in computers, computer and communication networks or computer systems, of threats to computer hardware and software and computer systems, data loss prevention and computer service evaluation;Computer software design, development, installation and maintenance service; advice and information on computer technology and computer security; consultancy services in the field of integration of computer systems and computer-controlled devices; computer and technology services for securing computer data and personal and financial information and for detecting unauthorized access to data and information, for example, computer virus protection services, data encryption services, electronic monitoring of personal identification information for detecting identity theft via the Internet; external backup and electronic data storage services; hosting and providing Internet platforms (software); monitoring of computer systems for security purposes; monitoring of computer systems for detecting unauthorized access or data breach; data security services in the field of digital assets; development of software for online operating and presenting of results of monitoring on computer and communication networks; development of software for the online operation and presentation of personal and targeted information on companies or individuals and online reputation management; research and development of new products for others; scientific research in the field of analyzing crimes and the security of information, computers, communications and computer networks and computer systems; computer security for preventing piracy and information deterioration; recovery of computer data, lost and/or deleted; remote monitoring of computer systems and computer and communication networks; computer programming for others in the field of computer security; computer security services, namely, implementation of security measures for preventing risks of intrusion into computers, computer and communication networks and computer systems, and in response to critical incidents in the context of breaches of the security of information, computers, computer and communication networks and computer systems; scientific research and providing advice in the field of analysis of vulnerability, risk and the security of computers, computer systems and computer and computer communication networks; certification services, namely, certification in the field of computer security and the security of computer and communication networks; technological expertise and technological advice to others in relation to the protection of the intellectual property rights thereof; appraisals, analysis and management of risk in the field of the security and safety of computers, computer and communication networks and computer systems; advisors' services relating to the security of computers and/or on networks; provision of information relating to the security of computers and/or on networks; rental of computer database software; computer code writing;
SOLID STATE MEMORY ENDECO, INC. 18 ATLANTIS DR. MARION MA 02738 DATA LOGGERS;
VIZUU Schäfer Werke GmbH Pfannenbergstraße 1 57290 Neunkirchen Germany Data loggers;Rental of data loggers; measurement evaluation services;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method of transforming and canonicalizing semantically structured data includes obtaining data from a network of computers, applying text patterns to the obtained data and placing the data in a first data file, providing a second data file containing the obtained data in a uniform format, and generating interface specific sentences from the data in the second data file.