9
Computer software for use in monitoring, analyzing, managing, optimizing and automating the security and management of IoT (internet of things) devices and systems and computer applications, hardware, networks and systems; computer software; software applications; downloadable electronic publications; downloadable instructional and informational material; documents, information, video, sound, text and other media or multi-media, all being electronically recorded or downloadable from the Internet, extranets or other communications networks
42
Software as a service (SAAS) featuring software for monitoring, analyzing, managing, optimizing and automating the security and management of IoT (internet of things) devices and systems and computer applications, hardware, networks and systems; providing temporary use of non-downloadable software; software as a service (SAAS) design and enhancement of computer software and computer systems; support, maintenance and technical assistance in connection with software and applications; research, design and development of computer systems and other applications; software design, consulting, maintenance and support services; provision of information relating to computer and communications software, hardware and to middleware; technical support services, namely, troubleshooting of computer hardware and software problems; design, development, writing, testing, installing, maintaining and updating of computer software; technical helpline services for computer software; operation of internet websites from which users may download computer software, source code and other technological information and materials; advisory and consultancy services, all relating to the aforesaid services
45
Licensing of computer software for use in monitoring, analyzing, managing, optimizing and automating the security and management of IoT (internet of things) devices and systems and computer applications, hardware, networks and systems; providing authentication of identity; security consultancy; licensing of technology, source code, computer software and other intellectual property for the protection of computers, computer systems, computer networks and internet websites against attacks from computer viruses, hackers, tampering, unauthorized intrusion and unauthorized manipulation of data; advisory and consultancy services, all relating to the aforesaid services