79094844
Dec 20, 2010
Oct 11, 2011
Digital switching networks comprised of computer network adapters, switches, routers and hubs; automatic digital electric switches; interfaces for inputs, outputs and peripheral devices for automatic digital switches, namely, telephone apparatus, internetwork gateway routers in the nature of computer control hardware, multiplexers, demultiplexers, and electrical network controllers; network infrastructure and access interfaces, namely, interfaces for computers, electronic display interfaces; recorded computer software for securing communications and IT infrastructure from cyber-attacks; all the aforementioned goods for digital radio communication networks; computer terminals and computer software for presenting information in graphical and text form; computer software for simulation, modeling, performing tests and performing experimentation; computer servers for simulations of civilian or military operations experiments, modeling and testing; computers, data processors, computer software, blank digital storage media and computer terminals, all the aforementioned goods for processing, surveillance and analysing data relating to computer hacking detection and/or messages relating to computer hacking, decision assistance in the case of computer hacking detection, automatic response in the case of computer hacking detection; computers, computer central processing units for data, recorded computer software for computers, all the aforementioned goods for the development, optimisation and analysis of performance of methods and algorithms; computer central processing units and computer software for processing and/or generating data pertaining to detecting, processing, monitoring, analyzing computer hacking; computer software and computer hardware for displaying measure and analysis results and reports, particularly in the form of messages, charts, tables and maps, resulting from analyzing performance and monitoring performance of data pertaining to detecting, processing, surveillance, analysis of computer hacking; computer hardware, software and computer peripherals all for the detection and prevention of hacking; computer hardware, computer operating software, and network, internet and computer security systems comprised of computer hardware and computer peripherals; computer hardware, software and computers for the detection, halting, interception, surveillance and removal of malicious software and other threats to computer equipment and software; computer hardware, software and computers for protecting and securing the integrity of data and preventing the loss of data
Electrical and Scientific ApparatusElectronic data transmission and transfer of data by telecommunications all in the field of detecting, processing, surveillance, analyzing of computer hacking relating to data on availability, hacking, vulnerability, insurance, compliance insurance, network layout; telecommunication access services; provision of access to data or documents stored electronically in central files for remote consultation; providing internet access that enables users to view data and information online over the internet; providing private and secure real time electronic communication over a computer network
TelecommunicationsTesting of computer security systems, Monitoring the computer systems of others for technical purposes and providing back-up computer programs and facilities, Technology specification, namely, analyzing technology requirements and developing recommendations for the computer software and systems and other technology needed to meet those requirements, in the field of IT infrastructure security; development, optimization, monitoring and testing the performance, methods, algorithms, and processes of software modules for computer processing of signals, namely, computer software development, and design and testing of new software for others; Technical support, namely, monitoring of network systems, in particular, of system algorithms for generating data pertaining to detecting, processing, surveillance, analysis of computer hacking; computer software development, and design and testing of new products for others all in the field of methods, algorithms, processes and software modules for generating data pertaining to detecting, processing, surveillance, analyzing of computer hacking; services in the field of surveillance and monitoring of performance, namely, computer monitoring service which tracks hardware performance and processes and sends out historical reports and alerts; services in the field of signal verification, namely, technical verification of computer network systems designs; services in the field of developing algorithms and methods for the computer processing of signals, namely, development of computer software; services for the generation and/or delivery of results particularly in the form of analysis reports, messages, charts, tables, maps, namely, computer software design; scientific and technological services and research and design relating thereto, namely, scientific research and development, and computer hardware and software design; industrial measures and analyses, namely, industrial research in the field of computer network security; scientific and technological services and research and design relating thereto, in the field of data processing, data analysis, data conversion, namely, scientific research and development; providing programs on data networks, namely, providing on-line non-downloadable software for securing computer networks against computer hacking; creating and updating computer programs for third parties; design and maintenance of on-line databases for others; computer technology support services, namely, help desk services in the field of computer security; protection services against computer hacking, namely, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability; computer software installation services; providing information in the field of computer security; research and development of computer software, and computer consultancy in the field of analyzing vulnerability, risk and security regarding computers, computer systems and computer networks; research and development of computer hardware and software; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems and maintenance of computer software and computer network software; automatic updating of computer software; computing services enabling the collection, compilation and analysis of data to elaborate and transmit reports and evaluations relating to the security level of others' software for others' computers, namely, computer security consultancy; computer systems analysis, namely, analysis of computer system data used to elaborate and transmit reports and evaluations relating to the level of security of others' software for others' computers; providing computer consultancy and computer information provided online regarding computer hardware and software for computer security; computer programming for others in the field of computer security; computer systems analysis pertaining to detecting, processing, surveillance, analyzing of computer hacking for simulation and experiments
Computer and Scientific