Brands and Their Owners
SPLUNK INC. contact information is shown below | |
Owner: | SPLUNK INC. |
---|---|
Owner Address: | 270 Brannan Street San Francisco CA 94107 |
Owner Web Site | |
Owner Phone | |
Owner Toll Free | |
Owner Fax |
Brand: |
ATOMICLABS |
---|---|
Description: | ATOMIC LABS;Providing a website that features temporary use of nondownloadable software for data processing, processing complex events and processing event streams; |
Category: | ATOMIC LABS |
Brand: |
BUGSENSE |
---|---|
Description: | Downloadable software for use in mobile applications for collecting and analyzing data from mobile applications;BUG SENSE; |
Category: | DOWNLOADABLE SOFTWARE USE |
Brand: |
CLOUDMETER |
---|---|
Description: | CLOUD METER;Software as a service (SAAS) services featuring software for monitoring, reporting on and troubleshooting the performance and availability of web applications; |
Category: | CLOUD METER |
Brand: |
D2E |
---|---|
Description: | Downloadable computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; downloadable computer software for detecting fraudulent transactions and activities; downloadable computer software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; downloadable computer software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; downloadable computer software for use in analyzing and monitoring computer networks; downloadable computer software for diagnosing industrial and business performance issues; downloadable computer software for application analytics; downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; downloadable data mining software;D TWO E; D TO E;Providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications for application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting services in the field of information technology; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems; |
Category: | DOWNLOADABLE COMPUTER SOFTWARE COLLECTING |
Brand: |
D2E |
---|---|
Description: | The mark consists of a circle design colored in a gradient of coral, orange and magenta (in various degrees) with the word D2E in white displayed thereon.;Downloadable computer software for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; downloadable computer software for detecting fraudulent transactions and activities; downloadable computer software for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; downloadable computer software for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; downloadable computer software for use in analyzing and monitoring computer networks; downloadable computer software for diagnosing industrial and business performance issues; downloadable computer software for application analytics; downloadable computer software for providing operational intelligence, business analytics, security information, and troubleshooting based on data; downloadable data mining software;D TWO E; D TO E;The color(s) white, coral, orange and magenta is/are claimed as a feature of the mark.;Providing temporary use of non-downloadable software and applications for collecting, analyzing, evaluating, monitoring, and transmitting data in the fields of compliance, network security, enterprise security, and maintenance; providing temporary use of non-downloadable software and applications for detecting fraudulent transactions and activities; providing temporary use of non-downloadable software and applications for investigating, remediating, and responding to fraud and to network and enterprise threat incidents; providing temporary use of non-downloadable software and applications for troubleshooting, diagnosing, and protecting computer software, hardware, networks, virtual machines, and operational technology; providing temporary use of non-downloadable software and applications for use in analyzing and monitoring computer networks; providing temporary use of non-downloadable software and applications for diagnosing industrial and business performance issues; providing temporary use of non-downloadable software and applications for application analytics; providing temporary use of non-downloadable software and applications for providing operational intelligence, business analytics, security information, and troubleshooting based on data; providing temporary use of non-downloadable data mining software; consulting services in the field of information technology; technical consulting services in the fields of datacenter architecture, public and private cloud computing solutions, and evaluation and implementation of information technology and services; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration and management of public and private cloud computing and information technology systems; |
Category: |