OWN THE OUTCOME
Mark Identification

OWN THE OUTCOME

Serial Number

88478189

Filing Date

Jun 18, 2019

Trademark by

PARSONS CORPORATION

Classification Information

Providing online non-downloadable computer software for displaying geographic information, geospatial information, geolocation information, weather and meteorological information, interactive geographic maps, and images of maps and mapped locations; providing on-line computer mapping services; providing online non-downloadable computer software for providing access to and searching interactive and non-interactive geographic information, geospatial information, geolocation information, geographic maps, and images of maps and mapped locations; providing online non-downloadable computer software for providing access to weather and meteorological information; providing online non-downloadable geographic information system (GIS) software; mapping services; providing weather and meteorological information; providing temporary use of non-downloadable computer software for calculating, mapping, transmitting and reporting logistical, navigational, and point-of-interest information via computers, wired and wireless communication devices, and optical and electronic communications networks; providing temporary use of non-downloadable mobile application software for calculating, mapping, transmitting and reporting logistical, navigational, and point-of-interest information via computers, wired and wireless communication devices, and optical and electronic communications networks; Computer services in the field of geographic information systems, namely, designing, developing, and deploying computer databases and geospatial software programs and custom applications for spatial data management, data analysis, and training and technical support; cartography services; computer programming for others; providing on-line non-downloadable geographic information system (GIS) software; consulting services in the field of geographic information systems (GIS) and IT systems; Providing information and online information in the fields of computer security, Internet security, data security, cybersecurity, information technology, computer systems, virtualization technologies, cloud computing and computing solutions and systems, datacenter architecture, and enterprise architecture; Computer security services, namely, providing security and anonymity for electronically transmitted protected health information, credit card and banking transactions; Computer security services, namely, identification of cyber threats through multi-source threat intelligence and analysis, development of mitigation strategies to minimize risk of computer system infection and data exfiltration, remote configuration of pre-integrated security tools to protect computer software and electronic data from viruses and cyber security threats, and infrastructure and security tool notification and configuration to return infrastructure to compliant state, all of the foregoing being for data, programming, equipment and software purposes; Secure hosting of digital content on the internet and secure website hosting; Technical support services, namely, remote and on-site infrastructure management services for monitoring, protecting, administration, and management of public and private cloud computing IT and application systems; Technical consulting, analysis, advisory, support, and managed security services in the fields of computer security, Internet security, data security, cybersecurity, information technology, computer systems, virtualization technologies, cloud computing and computing solutions and systems, datacenter architecture, and enterprise architecture; Managed security services and computer security services in the nature of detecting, testing, analyzing, and managing and implementing countermeasures and mitigation strategies and tools against data, computer network, and cyber breaches, threats, and invasions; Planning, designing, integration, configuration, implementation, and management of information technology (IT) systems, and virtualization, cloud-based, and cloud-computing systems and technologies; Software as a service (SAAS), platform as a service (PAAS), and infrastructure as a service (IAAS) featuring software platforms and technical support for the protection and defense against and response to data, computer network, and cyber breaches, threats, and invasions; Fraud detection services in the nature of computer consultation in the field of data theft, cyber threats, and cybercrime in the fields of computer networks security, cybersecurity, online commerce, and brand identification; fraud detection services in the nature of incident response teams that provide monitoring of network systems, servers and web and database applications and notification of related events and alerts in the fields of computer networks security, cybersecurity, online commerce, and brand identification; computer consultancy services, namely, technical analysis of cyber-threats, delivery of threat data, and generating and delivery of threat report; computer security services, namely, monitoring and reporting on cyber-threats for others; computer security consultancy in the field of cybersecurity, namely, collecting and aggregating data and intelligence; providing an on-line computer database in the field of computer network fraud detection; Engineering services in the fields of aeronautics and astronautics, chemical and biological defense, cyber security, electronic warfare and countermeasures, explosives detection and prevention, intelligence, surveillance and reconnaissance (ISR), neuroscience, radiological and nuclear detection and response; Agile software development; Design, analyses, development, testing, and integration of liquid rocket engines, liquid rocket stages and launch vehicles; Design, analyses, development, and testing the operation of guidance and navigation systems, avionics systems and complex aerospace structures; Development of earned value management and detailed project, planning and control in the fields of engineering and technology; Engineering services in the field of aerospace, security, and national defense, namely, organization and execution of system engineering for complex aerospace projects including the detailed definition of requirements planning, design reviews, qualification test planning and acceptance test activities; Development of technologies for ultra-precise and conventional computer numerical control machine tool fabrication; Precision design and engineering in the field of aeronautics and astronautics; Sub-micron scale particulate measurement utilized in testing; Measurement evaluations, namely, thermal and secondary ionization mass spectrometry in the field of atmospheric analysis; Laboratory research in the field of applied laser science; Systems engineering and development of optic systems; Advanced measurement and analysis in the field of aeronautical space systems

Computer and Scientific

National defense services, namely, physical security consultancy, industrial security services in the nature of providing surveillance of premises for others, and surveillance services in the nature of technical surveillance countermeasures (TSCM); National intelligence services, namely, providing reconnaissance and surveillance services in the nature of all-source intelligence analysis, counterintelligence (CI) services, signals intelligence (SIGINT) services, human intelligence (HUMINT) services, imagery intelligence (IMINT) services, information collection management, counterterrorism (CT) consultation and analysis, geopolitical security threat analysis, cyber threat analysis, open source intelligence (OSINT) services, and specialized intelligence project planning and analysis; providing specialized innovative security and intelligence solutions to the United States government and corporations, namely, security threat analysis for protecting public safety by creating insider threat programs, providing security and emergency management education and training programs, providing security consultation services, performing security risk analysis and security surveys, and undertaking specialized security projects; Security threat analysis for protecting personal safety; Providing security surveillance of premises for businesses and governmental agencies; Verifying and monitoring the credentials of personnel, employees, visitors, and security agents for government buildings, professional buildings, utilities, convention halls, and sports stadiums to ensure public safety

Personal