ANALYZING DATA COMPUTER DATABASES

Brand Owner (click to sort) Address Description
AEONWARE Aeonware Corporation 1010 Doyle St Menlo Park CA 94025 Analyzing data in computer databases for criminal activity; Computer security services in the nature of providing an internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; Computer security services in the nature of providing authentication, issuance, validation and revocation of digital certificates; Consulting and legal services in the field of privacy and security laws, regulations, and requirements; Consulting services in the field of maintaining the security and integrity of databases; Monitoring of computer systems for security purposes;
AVENTIV Aventiv Technologies 4000 International Parkway Carrollton TX 75007 Analyzing data in computer databases for criminal activity; Analyzing telephone calling pattern data in computer databases for criminal activity; security services, namely, electronic monitoring, detecting, recording and reporting of suspicious use of telecommunications systems provided to inmates and related parties for purposes of protecting public safety; Electronic monitoring services of telephone calls and emails of prison inmates for law enforcement purposes of protecting public safety; Fraud detection services for correctional institutions, namely, workers compensation fraud investigation services; Surveillance services; Surveillance services for providing information concerning possible criminal or suspicious activities of individuals or organizations; Monitoring services for tracking the location of people for law enforcement purposes and to ensure public safety using Global Positioning System (GPS) and Radio Frequency (RF) transceivers; Providing community supervision and tracking of people for law enforcement agencies, namely, monitoring the location of persons released from jail after posting bond, released from prison on probation, or serving alternative sentencing for purposes of law enforcement and public safety using GPS and RF devices; monitoring of individuals for law enforcement agencies, namely, monitoring the location of persons under house arrest, pre-trial, probationer, and parolee status for purposes of law enforcement and public safety using GPS and RF devices; Providing an on-line searchable database for law enforcement surveillance and investigation purposes featuring location and movement information regarding individuals monitored using GPS and RF tracking devices; Security services, namely, monitoring telephone calls to unauthorized phone numbers or persons for the purpose of criminal investigation, protecting personal property and ensuring public safety;
AVENTIV TECHNOLOGIES Aventiv Technologies 4000 International Parkway Carrollton TX 75007 Analyzing data in computer databases for criminal activity; Analyzing telephone calling pattern data in computer databases for criminal activity; Computerized security services, namely, electronic monitoring, detecting, recording and reporting of suspicious use of telecommunications systems provided to inmates and related parties for purposes of protecting public safety; Electronic monitoring services of telephone calls and emails of prison inmates for security purposes in the field of law enforcement; Fraud detection services for correctional institutions, namely, credit card and pre-paid calling card fraud investigation services; Surveillance services; Surveillance services for providing information concerning possible criminal or suspicious activities of individuals or organizations; Monitoring services for tracking the location of people for lay enforcement purposes and to ensure public safety using Global Positioning System (GPS) and Radio Frequency (RF) transceivers; Providing community supervision and tracking of people for law enforcement agencies, namely, monitoring the location of persons released from jail after posting bond, released from prison on probation, or serving alternative sentencing for purposes of law enforcement and public safety using GPS and RF devices; Monitoring of individuals for law enforcement agencies, namely, monitoring the location of persons under house arrest, pre-trial, probationer, and parolee status for purposes of law enforcement and public safety using GPS and RF tracking devices; Providing online computer databases for law enforcement surveillance and investigation purposes featuring location and movement information regarding individuals monitored using GPS and RF tracking devices; Providing online computer databases for communication of information between correctional institutions and law enforcement and investigative entities; Telephone services, namely, monitoring calls to unauthorized phone numbers or persons for the purpose of protecting and preventing fraud or otherwise adding security to telephone calls and other electronic transmissions of voice or data;TECHNOLOGIES;
ENTRUST ยป CONSTANT MONITORING FOR CONSTANT PROTECTION Data Driven Safety, Inc. 209 DELBURG ST STE 205 Davidson NC 28036 Analyzing data in computer databases for criminal activity; Employment background screening, namely, background screening of current employees/contractors/volunteers/ of others;
INNOVATIVE DATA SOLUTIONS Innovative Enterprises, Inc. 11824 Fishing Point Drive, Suite B Newport News VA 23606 Analyzing data in computer databases for criminal activity for background screening;DATA SOLUTIONS;
NATIONAL CRIMINAL INFORMATION SCAN Innovative Enterprises, Inc. 11824 Fishing Point Drive, Suite B Newport News VA 23606 Analyzing data in computer databases for criminal activity;CRIMINAL INFORMATION SCAN;
NAXO Naxo Labs 33 W 60th Street, Floor 2 New York NY 10023 Analyzing data in computer databases for criminal activity;
NAXO LABS Naxo Labs 33 W 60th Street, Floor 2 New York NY 10023 Analyzing data in computer databases for criminal activity;
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A method of managing access by a plurality of clients to a plurality of respectively different databases comprises the steps of: receiving a plurality of requests by the plurality of clients to access a plurality of different databases, the queries being received by a single application server; dynamically analyzing use of channel connections between the single application server and the plurality of databases; and dynamically allocating the channel connections between the single application server and each of the plurality of databases to service the plurality of queries based on the analyzing.