Recorded computer software for use in monitoring, testing, controlling and inspecting the lifecycle, compliance status, and usage records of industrial assets; Downloadable computer application software for mobile phones, namely, software for asset management, inspection workflows, traceability, and digital documentation; Downloadable computer software for use in maintenance analysis, administration, and documentation of industrial assets; Downloadable computer software platforms for managing electronic identification systems, namely RFID-based asset identification and tracking; Downloadable computer software applications for monitoring, testing, controlling and inspecting industrial assets; Downloadable electronic publications in the nature of downloadable magazines and electronic newsletters in the field of asset management and compliance
Electrical and Scientific ApparatusSoftware as a service (SAAS) services featuring software for database management, asset management, information transaction management, safety information management and monitoring, and for collecting, managing, analyzing, retrieving, monitoring and presenting data related to assets; Cloud computing featuring software for use in database management, asset management, information transaction management and safety information management and monitoring; Platform as a service (PAAS) featuring computer software platforms for database management and asset management; Computer programming; Computer software design; Maintenance and updating of computer software; Conversion of data or documents from physical to electronic media; Electronic data storage; Hosting of web sites; Installation of computer software; Computer software consultancy; Computer security consultancy; Digitization of documents; Off-site data backup; Providing information relating to computer technology and programming via a website; Development of computer platforms; Computer system analysis; Computer systems design; Data security consultancy; Internet security consultancy; Monitoring of computer systems for detecting unauthorized access or data breach; User authentication services using single sign-on technology for online software applications; User authentication services using technology for e-commerce transactions
Computer and Scientific