Computer hardware; electric sensors, namely, electronic devices for detecting and locating threats, enhancing perimeter protection, and preventing unauthorized intrusions using remote sensing systems; electronic devices composed primarily of sensors, microprocessors, and integrated communication transmitters and receivers installed in the field, affixed to equipment, or worn by personnel to transmit and receive geospatial, and location-intelligence data; integrated computerized system comprised of computer hardware and recorded computer software for the collection, editing, organizing, modifying, book marking, transmission, storage, and sharing of data and information related to threat discernment and analysis; downloadable computer management software to collect, organize, correlate, integrate, gather, capture, generate, analyze, and disseminate information, records, reports, and data, provide data sharing, access and integrate other databases, provide secure information exchange, facilitate project management, report and generate historical and geographic information system (GIS) mapping and geospatial mapping, track infrastructure capacity and capability, track and manage personnel, discern, track, and assess threats and damage, identify and track location and other geographic information, allocate and track inventory and vendors, and create, store, and organize documents, downloadable through electronic communications, the internet and mobile communications devices via a global computer network and portable and wireless networks and various platforms across multiple forms of media; downloadable computer software for use in public safety applications, threat discernment, emergencies, and crises, for database management, data analysis, and coordination of field personnel; downloadable computer software for sending distress notifications, geofencing, generating and receiving location-based notifications and personal proximity alerts, receiving news, alerts, updates and notifications on risks, crises, emergencies, and threats, and featuring tracking and locator functionality through GPS and geospatial and location-intelligence data; downloadable mobile application and associated downloadable data files for accessing and analyzing geospatial data; downloadable computer software and associated downloadable electronic data files featuring data for national and organizational security, security monitoring, asset identification, threat detection, threat intelligence, security integration, intrusion detection and prevention, and incident remediation for accessing and analyzing geospatial data; downloadable global positioning system (GPS) and geographic information system (GIS) software; downloadable computer software for locating, tracking, and monitoring threats; downloadable software for collecting, processing, transmitting, displaying, and analyzing geospatial data; downloadable computer software for digital modeling, data output, and data analysis in the field of threat detection; downloadable electronic data files featuring geospatial layers for geographical information system (GIS) use; downloadable geographic information system (GIS) software
Electrical and Scientific ApparatusHeadwear namely, hats, caps, and visors; clothing, namely, jackets; pants; shirts; shorts; sweat shirts; t-shirts; vests
Clothingbusiness project management; business risk management; business management of logistics for others; business consulting services relating to operations management, logistics, supply chain, and distribution solutions; business consulting services relating to product distribution; online retail store services featuring clothing, apparel, clothing accessories, coins, souvenirs, and miscellaneous gifts
Advertising and BusinessInstallation of wiring in accessible geographical locations for distribution of electricity suitable for electric vehicle recharging stations
Building Construction and RepairEducational services, namely, conducting classes, courses, seminars, and workshops live and by means of electronic communications networks, and development and dissemination of printed educational materials for others, all in the fields of security and threat discernment and response
Education and EntertainmentComputer security threat analysis for protecting data; consulting in the field of artificial intelligence technology; geospatial analytics services for use in discerning, identifying, evaluating, and mitigating potential threats and risks; intelligence analysis consulting services, namely, public safety consulting services in the fields of national security, signals intelligence, human intelligence, open source intelligence, counterterrorism, cyber threats, counterintelligence, human terrain, all-source intelligence, geospatial intelligence, imagery intelligence, technical intelligence, metadata intelligence, and digital network intelligence; technical consultancy in the fields of situational awareness, risk management, and threat monitoring, assessment, and response; providing temporary use of online non-downloadable software for mapping geospatial data; providing temporary use of online non-downloadable software for use in public safety applications, threat discernment, emergencies, and crises, for database management, data analysis and coordination of field personnel; providing temporary use of online non-downloadable software for sending distress notifications, geofencing, generating and receiving location-based notifications and personal proximity alerts, receiving news, alerts, updates and notifications on risks, crises, emergencies, and threats, and featuring tracking and locator functionality through GPS and geospatial and location- intelligence data; providing temporary use of online non-downloadable global positioning system (GPS) and geographic information system (GIS) software; providing temporary use of online non- downloadable software for locating, tracking, and monitoring threats; providing temporary use of online non-downloadable software for collecting, processing, transmitting, displaying, and analyzing geospatial data; providing temporary use of online non-downloadable software for digital modeling, data output, and data analysis in the field of threat detection; providing temporary use of online non- downloadable geographic information system (GIS) software; site surveying for security assessments of physical locations; computer security consultation, namely, providing assessments of computer systems for security purposes; computer security threat analysis for protecting data
Computer and ScientificConsulting services in the field of public safety; consulting services in the field of counter-terrorism; consulting in the field of security threat analysis for protecting public safety; Physical security consultation in the field of sustainable security measures and security program administration; surveillance; surveillance detection, namely, determining whether surveillance is being conducted; counter surveillance operations; security threat analysis for protecting public safety; security threat mitigation, namely, implementation of measures to mitigate security risk; security threat analysis for protecting personal safety; consulting services in the field of security threat analysis for protecting personal safety; security guard services, namely, providing and organizing advance teams for security of businesses and government agencies
Personal