09
Software in the field of telecommunications; software in the
field of data security for secure network access, data and
software security, encryption, content compliance and
governance; software for compliance management and risk
analysis in the fields of computer and network security;
software for electronic fraud and identity theft protection
37
Installation, maintenance and repair of telecommunications
equipment and networks, computer hardware, systems and
networks and electronic equipment; installation, maintenance
and repair of electrical and mechanical infrastructure at
data centers
38
Telecommunications services, namely, transmission of voice,
audio, visual images and data by telecommunications
networks, wireless communication networks, the Internet,
information services networks and data networks;
telecommunications services, namely, providing network
access points (NAPs); providing multiple-user access to a
global computer network; providing telecommunications
connections to a global computer network for telecom
hoteling; consultation in the field of telecommunications;
telecommunications gateway services; telecommunications
routing and junction services; providing co-location
services for voice, video and data communications
applications on internal, extranet and global computer
network servers, for others; leasing telecommunications
equipment, components, systems and supplies; providing
technical support services regarding the usage of
telecommunications equipment; consulting services in the
field of telecommunications; providing a website featuring
information in the field of telecommunications products and
services
39
Storage of computer and telecommunications equipment for
others
42
Leasing and rental of computing capacity, namely, computer
software, computer hardware and computer networking
equipment; evaluation of computer systems, namely, analysis
of internal computer systems, extranet computer systems and
global computer network systems, for others; implementing
computer software for others; designing, developing,
implementing and monitoring computer networks and computer
systems for others; computer and network monitoring
services, namely, performance reporting, load balancing, and
computer network security services; managed services,
namely, hosting the digital content and web sites of others
on a global computer network; providing non-downloadable
software for accessing and using a cloud computing network;
software as a service (SaaS), namely, providing hosted
software applications for others; application service
provider (ASP) services, namely, hosting computer software
applications of others; consulting services in the field of
software as a service (SaaS); infrastructure as a service
(IaaS), namely, providing remotely accessible server
computing; providing a virtual computing environment
accessible via the internet and other computer networks;
providing virtual computer systems and virtual computer
environments via cloud computing; leasing of computer
servers; technical management of virtual infrastructure and
computer networking; technical consulting services in the
fields of datacenter architecture, public and private cloud
computing solutions, and evaluation and implementation of
internet technology and internet services; remote
administration and management of in-house and hosted
datacenter devices, databases and software applications for
others; computer co-location services, namely, providing
facilities for the location of computer servers with the
equipment of others; providing secure,
environmentally-controlled, facilities and technical
monitoring for the computer servers and telecommunication
and network equipment of others; computer disaster planning
and recovery; design of premises-based, cloud-based and
hybrid unified communications systems; non-downloadable
computer software for compliance management and risk
analysis in the fields of computer and network security;
non-downloadable network security software; non-downloadable
identity verification software; providing temporary use of
nondownloadable network auditing software in the fields of
secure communications and data networks; computer
consultation and providing information in the field of
Internet and network security and secure transmission of
data and information; providing information in the field of
computer systems, cloud computing and virtual computing
infrastructure, via a website; electronic storage and
archiving of data for others providing remote cloud-based
server storage to others; data center services, namely,
centralized storage of electronic data for others; technical
consulting services in the field of electronic storage and
archiving of data for others; infrastructure as a service
(IaaS), namely, providing remotely accessible storage
capacity; technical management of virtual infrastructure
storage services; storage services for archiving of
electronic data; providing information in the field of data
storage products and services and data center services, via
a website; monitoring of computers, websites, computer
networks and communications network systems for security
purposes; computer networks and communications network
security services in the nature of intrusion protection,
security threat analysis, managed security services,
vulnerability management and assessment, threat analysis,
incident response and forensics and penetration testing;
providing user authentication services for security purposes
to others in the field of voice and data communication
services via computer network; computer security services in
the nature of the issuance and management of digital
certificates and other security credentials for others;
identity as a service (IdaaS), namely, providing cloud-based
computer network identification verification, authentication
and management services for security purposes; secure hosted
management, storage and administration of passwords,
credentials and identity information relating to persons,
accounts and devices for security purposes; fraud prevention
and detection access authorization system for verifying a
user's true identity for all purposes, on-line, featuring
control of access to information, medical records, computer
systems, websites, online services and e-commerce and
financial transactions; consulting services in the field of
computer security and communications network security;
providing information in the field of Internet, network,
computer and data security, via a website
45
Fraud prevention and detection access authorization system
for verifying a user's true identity for all purposes
on-site, featuring control of access to information, medical
records, computer systems, websites, online services and
e-commerce and financial transactions; providing information
in the field of fraud and identity theft protection, via a
website