A AVIDANT
Mark Identification

A AVIDANT

Serial Number

85603675

Filing Date

Apr 20, 2012

Trademark by

SUNGARD AVAILABILITY SERVICES LP

Classification Information

computer software for use in the fields of business continuity, contingency planning, disaster recovery planning, disaster recovery, data storage optimization, cloud computing, and computer security, namely, computer software for organizing, coordinating, automating, managing and monitoring a disaster recovery plan, for analyzing the risks and effects of an interruption of business, and for developing strategies for reducing exposure to and recovering from an interruption of business

Electrical and Scientific Apparatus

business management services in the field of computing and information technology; business continuity and continuity planning and management services; business consulting services in the fields of disaster recovery and business continuity

Advertising and Business

electronic storage of data; providing computer facilities for storage of data

Transportation and storage

computer disaster recovery planning; computer disaster recovery services; computer data backup, replication, and recovery services; managed hosting of computer software and databases of others; maintenance of computer network software for others; remote computer back up services; computer time-sharing services; data storage optimization services, namely, providing application services provider (ASP) services featuring computer software for data storage optimization, and consulting services related to data storage optimization; data center collocation services, namely, providing facilities for the location of data center computer servers with the equipment of others; cloud computing services, namely, providing virtual computer systems and virtual computer environments through cloud computing, and providing data recovery services, data replication services, and data backup services through cloud computing; hosting of software applications for others; computer security services, namely, hard drive erasure, computer security consultancy, design and development of data security systems, and restricting access to and by computer networks to and of undesired websites, media, individuals and facilities; computer software development services; consulting services related to the foregoing

Computer and Scientific