Use GleanMark for a free trademark search powered by millions of USPTO records. See similar trademarks, filter results, and sign up for active monitoring.
Downloadable computer software for artificial intelligence (AI) native enterprise operating system software for orchestrating autonomous agents, executing workflows, managing knowledge graphs, enabling natural language operational control; Downloadable computer software for integrating business applications, managing enterprise memory and strategy, and supporting organizational decision support, governance and compliance management through downloadable modules and plugins; Platform as a service (PAAS) featuring computer software platforms for enabling AI-native enterprise operations; Software as a service (SAAS) services featuring software for AI-native operating systems that provide orchestration of autonomous agents, unified enterprise memory, strategic synthesis engines, and policy-aware execution; Infrastructure as a service (IAAS) services, namely, hosting software for virtualized operating environments for AI-first business operations, development and deployment of modular, extensible applications for use by others; IT consulting services relating to installation, maintenance and repair of computer software
Chemicals used in industry; chemicals and chemical products for use in industry for sanitising, biocide treatment, antifreeze, scale control, deposit control, noise reduction, corrosion control, leak sealing and cleaning of central heating systems, heat transfer systems, solar heating systems, and heat pumps such as ground source heat pumps and air source heat pumps | Preparations for use in the cleaning, flushing, sediment removal or de-scaling of heating systems, cooling systems, heat transfer systems, boilers, water storage systems, solar heating systems, heat pumps in the nature of ground source heat pumps and air source heat pumps, heaters, radiators, pumps and pipes | Parts of cooling or heating installations, namely, dosing valves
Downloadable or recorded computer software that collects, identifies, and processes next-generation barcoded sequencing data of protein mutations and displays the results in a graphical user interface
electronic cigarettes; tobacco substitutes; tobacco substitutes not for medical purposes; oral vaporizers for smokers; electronic cigarette liquid (e-liquid) comprised of flavorings in liquid form, other than essential oils, used to refill electronic cigarette cartridges
Automated handling equipment, namely machines for processing microelectronics being semiconductors, printed circuit boards (PCBs), and integrated circuits (ICs); Machines for manufacturing microelectronics being semiconductors, printed circuit boards (PCBs), and integrated circuits (ICs); Wet processing machines in the nature of machines performing liquid chemical procedures such as etching, plating, and cleaning, all used during the fabrication of microelectronics being semiconductors, printed circuit boards (PCBs), and integrated circuits (ICs), as well as in metal finishing production; Rinsing machines used during the fabrication of microelectronics being semiconductors, printed circuit boards (PCBs), and integrated circuits (ICs); Conveyors being machines used during the fabrication of microelectronics being semiconductors, printed circuit boards (PCBs), and integrated circuits (ICs)
Condoms; Contraceptive implants; Contraceptive devices, namely, intra-uterine contraceptive devices; Diaphragms for contraception; Spermicidal condoms; Contraceptive apparatus; Adult sexual stimulation aids, namely, masturbation cups, sexual stimulation balls and Kegel balls; Medical machines and apparatus, namely, semen collection machines and body fluid collection machines being sperm collecting devices for facilitating pregnancy
orthopedic fixation implants composed of artificial materials, namely, foot implants designed to aid in early bone growth; none of the foregoing used in the field of neurovascular surgery or to treat neurovascular conditions
Downloadable video game software and electronic games via the internet and wireless devices for use with mobile devices, mobile phones, tablets and portable computers; Computer game software for use with personal computers, home video game consoles used with televisions and arcade-based video game consoles
Providing transport for sightseeing tours; Providing transport for sightseeing tours by boat; Providing transport for guided tours by boat; Providing transport for guided tours; "RIDE"
Downloadable computer software for performing security, threat, and risk-management assessments, analyses, and investigations; downloadable computer software, namely, software for management of security breach incidents and responses; downloadable computer software, namely, software for the protection of digital assets from cyber warfare, computer hacking, and computer viruses; recorded computer databases in the field of computer software protection, security threat assessment and threat actor identification, pursuit, and deterrence, cybersecurity, computer security, information security, data security, data breach, identity theft, and fraud risk-management and assessment, and encryption technology recorded on computer media; downloadable computer software for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware in the field of computer software protection; downloadable operating software in the nature of computer software for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware in the field of computer software protection; downloadable computer software for monitoring and analysis, namely, for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable computer software for use in monitoring use of computers for security purposes; downloadable computer software for the detection and removal of computer viruses and threats; downloadable computer software for detecting and repairing computer software and hardware problems; downloadable computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; downloadable computer optimization software for the protection and running of computer hardware | Providing and hosting a secure electronic online system featuring technology that allows cyber surveillance to assist in providing defense against data breaches and privacy violations; computer security consultancy in the fields of scanning and penetration testing of computers and networks to assess information security vulnerability; security information services, namely, customized computer security platforms that provide real-time analysis of security alerts generated by network hardware and software, namely, platform as a service (PAAS) featuring computer software platforms for computer security; computer security consultancy; computer software testing to identify security vulnerability; computer forensic services; computer security consulting services in the field of maintaining the security and integrity of databases; computer network security services and communications network security services in the nature of network intrusion protection testing, computer testing for vulnerability management and assessment, risk management and assessment, data breach threat analysis, network threat analysis; computer and network incident response and forensics and penetration testing; computer security consulting services in the field of critical incident response to information, computer, and internet security breaches; computer security consulting services intended to identify, pursue, and deter threat actors; computer software development, design, and implementation services in the field of security for computers and computer networks; computer systems analysis in the field of security for computers and computer networks; computer consultation regarding computer networks and internal computer networks and security services for computer networks and internal computer networks, namely, installation, design and customization of computer security platforms; computer consulting services in the field of security integration, network security, encryption technology, and computer security; software as a service (SAAS) services featuring software for use in scanning networks and websites to detect and identify vulnerabilities and malware; computer programming of internet security programs; design and development of computer software programs for Internet security; data security services, namely, design and development of internet security software and electronic data security systems; design and development of electronic data security systems; updating of computer software relating to computer security and prevention of computer risks and risk management; maintenance of computer software relating to computer security and prevention of computer risks and risk management; development of technologies, namely, computer software development for scanning, detecting, removing and preventing viruses, worms, Trojan horses, adware, spyware, and other malware for the protection of electronic networks; providing technical information and technical advisory services related to computer software, computer network design, computer and data security, network security, computer security integration, and encryption technology; fraud and identity theft protection services in the nature of electronic monitoring of personally identifying information to detect identity theft via the internet, namely, accessing, scanning and monitoring of reports, the Internet, public records, and computer activity and accounts to facilitate the detection and prevention of data breaches, identity theft and fraud; monitoring of computer systems for detecting unauthorized access or data breach; Data security consultancy in the fields of data breach, identity theft and fraud risk-management and assessment services, fraud detection, and data breach response, threat assessment and simulation, vulnerability analysis and mitigation, and emergency response; data security consultancy in the field of security threat assessment and threat actor identification, pursuit, and deterrence; monitoring of computer systems, and data network systems, and the Internet for security and risk assessment purposes, namely, detecting unauthorized access or data breach; electronic monitoring services for security purposes in the field of computer and internet services, namely, monitoring of computer systems for detecting unauthorized access or data breach