97401914
May 9, 2022
Battery chargers for mobile phones; Cases for mobile phones; Computer hardware; Computer hardware, namely, wireless access point (WAP) devices; Downloadable computer anti-virus software; Downloadable computer software for encryption; Downloadable computer software to automate IT infrastructure and cybersecurity; Downloadable computer software for managing, configuring, installing, and uninstalling software applications and data; Downloadable electronic publications in the nature of manuals, technical documentation, brochures, and newsletters in the field of data security and security of endpoints, computer systems, computer networks, servers, the Internet and mobile devices; Downloadable software for ensuring the security of electronic mail; Downloadable software for cybersecurity, namely, for scanning, detecting, blocking, quarantining and eliminating of viruses, worms, trojans, spyware, adware, spam, malware, vulnerabilities, intrusions, and unauthorized data and programs on computers and electronic devices; Downloadable software for managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Mouse pads; USB computer security key
Electrical and Scientific ApparatusMarkers; Paper and cardboard; Pens; Printed calendars; Printed instructional and teaching materials in the field of information technology; Printed matter, namely, paper signs, books, manuals, curricula, newsletters, informational cards and brochures in the field of data security, computer security and network security; Staplers being office requisites; Stationery; Printed stickers
Paper Goods and Printed MatterDrinking vessels; Household containers for foods; Lunch boxes; Water bottles sold empty
Housewares and GlassBaseball caps and hats; Clothing, namely, jackets, jerseys, vests, shirts, pants, gloves, socks, arm warmers, leg warmers; Footwear; Visors being headwear
ClothingAction figure toys; Balls for sports; Golf divot repair tools; Golf tees; Playing cards; Puzzles; Spinning fidget toys
Toys and Sporting GoodsBusiness administration services; Business services, namely, administration of a program for enabling participants to receive expedited services in the field of data security, computer security and network security; Customer service management for others; Database management; Promoting the use of the security assurance best practices of others in the field of cloud computing; Providing a website used to place on-line commercial orders in the field of computer hardware and computer software; Value-added reseller services, namely, distributorship services featuring computer security and information technology products; Wholesale services through direct solicitation by distributors directed to end-users featuring computer hardware and computer software
Advertising and BusinessInstallation, maintenance and repair of computer hardware; Technical support services, namely, troubleshooting in the nature of the repair of computer hardware
Building Construction and RepairCommunication by computer terminals; Information transmission via electronic communications networks; Providing telecommunications connections to a global computer network; Providing virtual private network (VPN) services, namely, private and secure electronic communications over a private or public computer network; Telecommunication access services
TelecommunicationsComputer education training; Educational services, namely, conducting educational technical demonstrations, presentations, workshops, and training seminars in the field of information technology, computers, data security, computer security, and network security and distribution of course materials in connection therewith in printed or electronic format; Providing information relating to education services
Education and EntertainmentCloud computing featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Computer security consultancy; Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Computer services, namely, hosting an interactive web site that allows businesses to design, build, manage, modify, test, run, and publish IT infrastructure and cybersecurity automation; Computer services, namely, on-line scanning, detecting, quarantining and eliminating of viruses, worms, trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; Computer software development; Computer virus protection services; Consultation services relating to computer software; Installation, maintenance and repair of computer software; Software as a service (SAAS) services featuring software for use in managing, monitoring, protecting, authenticating, and securing data, endpoints, computer systems, computer networks, servers, the Internet, and mobile devices; Software as a service (SAAS) services featuring software for businesses to design, build, manage, modify, test run, and publish software system installation and configuration automation; Software authoring; Technical support services, namely, troubleshooting of computer software problems; Technology consultation in the field of cybersecurity
Computer and ScientificProviding information on the development of privacy, security and data governance law via a website
Personal