9
Computer software for encryption; computer software for use in the encryption and decryption of digital files, including audio, video, text, binary, still images, graphics and multimedia files; software for ensuring the security of electronic mail; computer software for controlling and managing access server applications; communications software for connecting computer network users via global computer networks; computer hardware and software for setting up and configuring local area networks; computer hardware and software for setting up and configuring wide area networks; computer software for administration of computer local area networks; LAN (local area network) operating software; VPN (virtual private network) operating software; WAN (wide area network) operating software; anti-spyware software; computer software for use in the safeguarding of digital files, including audio, video, text, binary, still images, graphics and multimedia files; downloadable software for assuring data privacy, integrity, identity and authenticity; entry/exit security portal comprised of an electronic passageway equipped with biometric devices for identification verification and detection of impermissible items being carried through; computer software, namely, an application allowing sales and field service employees to update and receive data stored in the enterprise's computer databases in real time, using a mobile device, with full telephony integration with the telephone and/or software features of the mobile device; enterprise software in the nature of a database for non-transactional data and a search engine for database content; computer hardware, namely, firewalls; computer software for the creation of firewalls; secure terminals for electronic transactions; computer programs for searching the contents of computers and computer networks by remote control; electronic publications, namely, user manuals, instructions, and product updates featuring user information and product updates recorded on computer media; computer software for assuring data privacy, integrity, user identity, access and authenticity; parts and fittings for all of the aforesaid goods
42
Technical research; project studies (technical-); studies (technical project-); engineering; research and development for others; biological research; computer programming; computer software design; computer software (updating of-); consultancy in the field of computer hardware; rental of computer software; recovery of computer data; maintenance of computer software; computer systems analysis; computer system design; installation of computer software; data conversion of computer programs and data (not physical conversion); computer software consultancy; rental of web servers; information, advisory and consultancy services relating to all of the aforementioned services