Design Feature:
|
(1) Surfaces or backgrounds covered with lines or bands
(2) Surfaces or backgrounds covered with straight lines or bands
(3) Straight lines or bands
(4) More than two lines or two bands
(5) Thick lines, bands
(6) Vertical lines or bands
(7) Rectangles
(8) Quadrilaterals with dark surfaces or parts of surfaces
(9) Other irregular parallelograms, trapezia and quadrilaterals, quadrilaterals containing one or more rounded corners
(10) Quadrilateral figures with one or more convex or concave sides -- Note: Not including elongated surfaces with one or more convex or concave sides (25.3.1).
(11) Several quadrilaterals juxtaposed, joined or intersecting
|
Goods and Services Information
|
Description:
|
(1) - Multi-platform, downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
(2) - Software as a service (SAAS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
(3) - Multi-platform, downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
(4) - Multi-platform, downloadable computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
(5) - Software as a service (SAAS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
(6) - Software as a service (SAAS) services featuring computer network security software for managing computer network endpoint security and predicting and monitoring security threats to computer networks using behavioral-based predictive execution modeling
|