85267134
Mar 15, 2011
Computer software for security assessment; computer software for design and implementation of computer systems security architecture; computer software for user access authentication, identification and verification; computer software for analysis of information embedded in network Internet Protocol (IP) traffic; computer software for authentication of personal identification information; computer hardware, namely, packet analyzers and computer network servers for multiple virtual machines; computer hardware for high-speed processing and storage of data using multiple CPUs
Electrical and Scientific ApparatusBusiness services, namely, business advisory services, consultancy and information for others in the fields of business information management, business analytics, business process improvement and business production systems development; records management, namely, document indexing for others
Advertising and BusinessComputer consulting services in the fields of enterprise resource planning (ERP) software, data processing software, database management software and data storage software; computer security, namely, security assessment, computer systems security architecture design and implementation, defense-in-depth design and implementation, and user access authentication; information technology consultation, namely, enterprise computer system architecture, software engineering, service oriented architecture (SOA), enterprise systems management, and data warehousing, design, analysis, development and management of networks, namely, WAN (wide area networks), MAN (metropolitan area networks), LAN (local area networks); technology migration, namely, migrating existing computer systems to replacement computer systems; selection, implementation and use of computer hardware and software for others; computer disaster recovery planning
Computer and Scientific