`
`
`
`Sent: 9/10/2020 4:43:24 PM
`
`
`
`To: TTAB EFiling
`
`
`
`CC:
`
`
`
`Subject: U.S. Trademark Application Serial No. 87697680 - NETARGOS - TM1215US00 - Request for
`Reconsideration Denied - Return to TTAB - Message 6 of 6
`
`
`
`
`
`
`
`*************************************************
`
`Attachment Information:
`
`Count: 14
`
`Files: 20-2.jpg, 20-3.jpg, 20-4.jpg, 20-5.jpg, 20-6.jpg, 20-7.jpg, 20-8.jpg, duplicate name 59264 20-1.jpg,
`duplicate name 59265 20-2.jpg, duplicate name 59265 20-3.jpg, duplicate name 59266 20-4.jpg,
`duplicate name 59267 20-5.jpg, duplicate name 59881 20-1.jpg, duplicate name 59881 20-2.jpg
`
`
`
`
`
`
`
`r
`
`Securing your network in the modern era
`Aruba bridges Itle gap between l? and security teams to address security threats. A
`oomplete campus. branch. and cloud—connected network lntraslructure with bulll—ln
`secunty. advanced threat detectlon and response, and secure network a.
`provides 350 degrees at analytics-driven cyber protection.
`Read me Executlve Brief
`
`our sales exper
`rematn avaltah
`
`
`
`leo Sales (nar
`r
`
`8.43
`(an5 are expected to runner: to network-3 my 2m?
`
`84%
`olorganrlallon-s have experrenced en loT-relaled securrry
`breath:
`
`35%
`olcyhersewnlv pros Can‘t use securlty to
`polentlal. dscreaarng elructwanes:
`
`
`
`
`Live Sales (hat
`l
`l'
`
`Innovative solutions to protect your network
`Take a new approach to the ever—changlng threat landscape and prepare your organtzation to proactively deal with cyber
`attacks.
`
`
`
`
`
`
`
`
`
`
`
`
`
`Advanced threat detection
`
`'
`. Arm yoursecunt‘ylearnswrmInsights‘ enabling themto blackattacksbereretheydodamage IrIIroSpe
`uses machine learning and analytics to spot changes In user behavior ihai nflen inolc‘aie inside atiaots WIIODI'II. Batik—
`
`evaded perimeter defenses
`Our sales experts
`remain avallable
`Learn More
`Let
`Live Sales C
`
`
`
`
`. .
`
`Analytics-driven cyber protection
`Give your security and W teams an integrated way to proactively detect and respond to advanced cyberattacks
`across any lnfrasiructure. The Aruba 360 Secure Fabric is an enterprise security iramewnri: that provides 360
`delrees of active cyber protection and secure access
`Learn More
`
`
`Weleorne B
`our sales experts
`
`remain available
`ro you
`LIVL‘ Sales C net
`
`
` Wlluorm Bafit!
`
`Secure network access control
`Improve user and device visibility, mntrol‘ and response across mulIl—venoor networks Aruba ClearPass
`secureNAC enables enterprises to cover the entire set or access cantrol use cases tncluamg wired and wireless
`networks. loT. BYODr corporate enboarding. policyvbased remediation. and adaptive attack response
`Learn More
`
`‘ l
`
`X
`
`'
`
`
`
`
`
`
`
`
`
`
`
`How secure is your network?
`IDT, BYOD, and an always-0n workforce increase exposure uf IT
`infraslruclure to cyber attacks. Frnd out if your business is ready to face
`these threats
`
`our sales emperis
`runaln avalflnle'
`
`‘
`
`Q
`
`Live Sales Char
`I
`I
`
`\
`
`Welcome Bail!!!
`Our sales experts
`r
`remain aval .hls‘
`r
`
`Live Sales (her
`I
`r
`
`End-to-end security
`Aruba GrearPass and |ntruSpec1 can be applied to any nemum as a security overlay across campus. dlslributed
`enlerprisa, dam, and luT Edge Environments. Together may provide analylics-driven protection, mum: network
`access conlror‘ and Integraled anack response.
`Learn More
`
`
`
`
`
`
`
`
`
`
`Woluorno Bath!
`
`ramaln avanphlai
`our sales uperrs I
`'r
`m yau
`
`
`
`
`
`
`
`
`
`
`
`
`Open, multi-vendor integration of security solutions
`Securlly can be an expensive. time coneuming investment, and innovation is needed to keep ahead 01 hackers.
`With over ‘iDU partners‘ the Aruba 360 Security Exchange eoosyslem brings togelher powerful thirdvpany solutions
`providing end-mend security.
`Learn More
`
`LIVE‘ Sales (rm
`i
`
`
`
`WeiconleBaék!
`remain available
`our sales «perv: I
`;
`in you
`
`
`
`‘ L
`
`
`
`
`
`Aruba technology and services
`
`
`
`IV:- Salus ChaT
`
`Welcome Back!
`our sales experts
`i
`rzrnaln avallibla‘
`in you
`
`‘ L
`
`ive Sales Chsi
`i ‘
`l‘
`
`3 \
`
`
`
`Our experts will
`
`Connect with a network security specialist
`yer your question; and help you start the process of securing your network against ourreni and future threats
`
`Sales Cnat
`Available
`
`)
`
`V
`
`_
`
`-
`
`-
`
`.'
`
`EmailSaiEs
`
`
`
`
`
`yE
`
`m
`
`In
`
`Technology partner programs
`Aruba technology partners deliver innovative
`salutinns that connect the data between today's
`business and IT priorities.
`
`inteliigent cloud network management
`Monitor, troubleshoot, and manage your Aruba
`wired and Mreiess network In the cloud with
`Aruba Central.
`
`ND DLIT MORE
`
`FiND OUT MORE
`
`
`
`Worlddass support service
`Gain 24x7 access to criticai iniolmati
`support through the Aruba Support or
`well as valuable dlscusslans In the A
`Live Salts Chat
`
`community
`
`
`community.
`FiND OUT MORE
`
`Resources
`
`
`
`
`
`fil
`
`
`
`fir
`
`
`
`
`
`
`
`n mm
`A new way to dea‘ wiih security
`threats
`
`g 310514.141
`What‘s on your netwotk? Is your
`network ready for loT?
`
`a maze
`Bethe champion: Welcome to the
`new age of cyber security
`
`Walch the Vldfifl
`
`mew me \mograpaue
`
`Watch lha Vlden
`
`u"
`
`u‘
`
`fi‘
`
`63 mu‘fiuwilhn Pm mm
`360 magmas 0f anaiy‘tms-dnven cyber
`protection
`
`n \ HIl-u
`Gain \nsshility and contra! uf ynur
`network with ClearPass Secure NAC
`
`@ [nu-mun
`ClearPass ensures connectrvwly far 14
`million museum visitors
`
`Duwnluadme Summon Elna!
`
`Watch me Vlden
`
`Viewme Case Sludy
`
`31m MW: 0
`
`"Gulhlm Sam! 4 am. Cumeuea mugs mu Be in Use mzmr, Up 31 Falwll|me201fl ' Gaunt-1, Femudqy 2017
`2' Maklng sense an loT' How me Internet «1 Things became humanity‘s nervous syslem.‘ HPE 2017
`a 'mmug. lhe Eyes or (fiber Seeumy Fmteesmals Annud Research Rapnn(F'ar1ll)"‘ ESGlISSA,Dec.ember 2n1e
`
`le'r: Salas ChaT
`
`Live Sale; Chaf
`
`1--
`
`
`
`
`
`
`
`
`
`hm»; mm» mm W uu'ulemnemklnwnalmlk mum mm
`
`03mm]: n13) II PM
`
`How can we help?
`Search npe mm
`
`lent-M l
`H
`.l l -lal
`mm It
`
`M an
`
`DEM fill
`mlnew
`.m.‘.'Frmv‘l
`
`,
`
`l0 vuu‘
`
`Welcome Back!
`Our sales experts
`remaln available
`w you
`
`IL a to Buy
`
`Qmm . Sllppflfl
`
`E]
`Euml salcs
`
`I}?
`\L'lnl wull )alc:
`
`Welcome Back!
`om sales experts
`ramiln avallalala
`la you
`
`Live Sales Cha?
`’ -.
`
`Du‘M Sell
`
`Welcome Back!
`our sales experts
`remaln avallable
`
`
`
`
`
`
`
`
`
`mvflmwfimmremsmwklanmfflm:emglLlueJmessianismanmsmesrtemwmk=mn
`
` \
`
`Save up to 45% on laptops. desktops and more with exclusive pricmg
`shop Now \ Questions? Call 1-800-456—3355 nr Click In (the!
`Z ‘.“\>.-. 5:2,
`7 ‘ :Mu: r“; r..-
`
`11 '3'
`.
`‘— “'°‘“°'°‘P”’°E“°'s giruifirtgiisl
`Emma: m In
`In
`Small Business Solutions
`
`2
`
`KNOW YOU'VE BEEN HEARD.
`
`OUR ADVISORS LISTEN, SO YOU
`
`
`
`
`
`
`
`
`
`lumjmm M. :omrenruemmmhowm remallrhuemeeycp.’sma LbuBmBScrLenHal'r‘n-LFmH
`m, ummgg 21 53 um
`
`
`
`.\.. Viden ueH Yechnoloqy AdvlSOHC ’30)
`
`aDoll Technologies Adviser '
`877-AESK DELL
`7 wow Sma‘ ‘_‘ mu.
`.-
`‘
`
`:
`
`\.
`
`Dell Technologies Advisers Are Ready to Help
`
`
`
`.llll
`
`
`
`EL
`
`3..
`
`
`
`
`
`
`
`
`
`M
`
`Tailored Solutions
`buslness prmnm.
`
`.Il:
`
`Reliable Advice
`
` V
`
`Dedicated Partnership
`
`Technology Sotutions
`
`Ready When You Are
`Keep your business productive with [he built-In smear or“?! new XPS 15. Fowel up In
`mfliiflrnndt nn mafiar mm mm“... mm- In um: Inn In :nrurnlv wm. line! a
`
`For more lechnology solutions:
`Shop Deals
`work From Home Solutions
`PaymerIt Soluuons
`Shop Our Catalog
`
`Resources
`
`
`
`
`
`
`
`
`
`., .m mm
`
`--
`v
`a
`' Succes: through Partnerships
`
`smummmm Temmtnmmmw
`Vufirslsavu
`may
`
`Ianoolsrorasauel
`colhbuafiuev’ulwoffu
`
`Hwflpanfimkuumm
`Balefiwou Ruins;
`
`Expand Your Network
`
`Joma gaoml network of powerful femme busmess lamars and lmd flaw waysm get
`\nsprred, connect and lransfurm your builnessr
`
`Assn MS? or n mnsulcanl. m: Dell Expert Nelwork bangs a world anew-mg“.
`Jnmthe pmglamln unmck a variety ol hermfltslrum a gamma IT accnum
`manager m training and rewards.
`
`
`
`
`
`
`
`
`
`
`
`1 Learn More
`
`‘ Learn More
`
`FasL Easy. Financing.”
`mmwmmmmmmMM‘
`
`1i?
`De|| Rewards
`mummfluuflmhmmmwm
`
`\?
`Free Shipping 8. Easy Returns
`mmmuwem.nmmm.
`
`m I Payment
`
`'
`
`ax
`
`'mmiw
`
`
`
`
`
`
`
`
`
`
`
`
`
`||||p-.*.heunvort.anplk Durllfflurde.’sec.lr|j.’ nhoeucrmmaccmlediweb
`
`UaJlUCUzJ E4 37 53 2M
`
`Apple Platform Security
`80.". mt;
`
`Table of Contents
`
`'
`
`l Search the user gurde
`
`Cnmmumtlas
`
`cmnmpm
`
`Introduction to Apple platform security
`Apple designs securrty mm the core of I15 plafiormt. Bulldrng an the expenence of creating the wnrld‘s most
`advanced mublle operating system, Apple has created securrty arclnteclures that address the unique
`reuurrements pfmublle watch desktopand home
`Every Apple deVIce combrnes hardware software and sen/Ices deSIgned m wark together for maxrmllm secuflw
`and a transparent user expenence in servrce ofthe ultimate goal of keeprng personal Information safe Custom
`security hardware powers crltloal securrty Teatules Software prutecllons work to keep the opelalrng system and
`
`
`
`
`
`
`
`
`
`
`
`thirdparty apps safe. Services provide a mechanism [or secure and timely scflwere updates. power a safer app
`ecosystem. secure wwnunbafions and payments. and prtwide a saler experience on the tnlemel. Apple devices
`created not only the device and its data. but the entire ecosystem. including everything users do locally. on
`netwurts. and with key Internet services
`Just as we design our products to be simple.inmit1veend capable. we design them to be saute. Key security
`features. such as hardware-based demos encryption. can’t be disabled by mistake. other features. such as
`111's dommentfltiun prmldes details about how security malnulngy and features are Implemented wulhl‘n Apple
`platfum'is It also helps organizahuns numbine Apple platform security technclogy and features with their own
`policies and procedures to meet theirspecificsewrity needs.
`The mitent is organized inh) the foltnwing topic areas:
`- Ham-re Securlly and Biometrics: The hardware that tom the foundation for semrrty on Apple dewoes.
`including the Secure Enclave. dedicated AES aypto engine. Touch ID. and Face ID.
`- System Security: The integrated hardware and soflware functions that pmtde torthe safe boot. update, and
`ongoing operation of Appte operafing systems.
`- EncryptionandDauProhcfion:Thearchiteduramddesignmatpmleususerdataitmedevioeislostor
`
`
`
`

Accessing this document will incur an additional charge of $.
After purchase, you can access this document again without charge.
Accept $ ChargeStill Working On It
This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.
Give it another minute or two to complete, and then try the refresh button.
A few More Minutes ... Still Working
It can take up to 5 minutes for us to download a document if the court servers are running slowly.
Thank you for your continued patience.

This document could not be displayed.
We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.
You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.
Set your membership
status to view this document.
With a Docket Alarm membership, you'll
get a whole lot more, including:
- Up-to-date information for this case.
- Email alerts whenever there is an update.
- Full text search for other cases.
- Get email alerts whenever a new case matches your search.

One Moment Please
The filing “” is large (MB) and is being downloaded.
Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!
If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document
We are unable to display this document, it may be under a court ordered seal.
If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.
Access Government Site