09
Downloadable computer software for cybersecurity, detecting
and mitigating network attacks using artificial
intelligence, machine learning and/or deep learning;
downloadable computer software for continuous monitoring,
identifying, verifying, analyzing, comparing, classifying,
sorting and scoring of collected or acquired data from
network traffic, network communication, network flow data,
and network intercommunication using artificial
intelligence, machine learning and/or deep learning;
downloadable computer software for providing initiation,
distribution, delivery and response tracking of emergency
notifications to users via personal communication devices
and public mass communication devices; downloadable computer
software for supporting exchange of information and
collaboration processes amongst organizations and people
during emergency and crisis situations; downloadable
computer software for the purposes of data collection,
monitoring, and mass notification services for managing
emergency, and crisis and business critical situations and
improving crisis communications capability; downloadable
computer software for the secure transmission of mass
notification emergency information via audio, video and
electronic communications networks and devices, including
social networks; downloadable computer software for managing
and analyzing data feeds and data inputs in the field of
crisis reporting, communication and management, and for
sending notifications through multiple IP network channels
and delivery services; downloadable computer software for
loading data from personnel directories, and managing users
for purpose of crisis communication; downloadable computer
software for managing organization directories and
connections across organizations for the purpose of
connecting them and facilitating collaboration before,
during and after crisis situations; downloadable computer
software for locating personnel for security and safety
purposes using a global positioning system, user
self-reporting, and other locating means; downloadable
computer software for electronically monitoring, detecting
and reporting on alarms, alerts, emergencies, hazards,
security threats, and dangerous weather; downloadable
computer software for notifying individuals and
organizations of a changed status or condition of a sensing
device or input feed via network based message alerts;
downloadable software in the nature of a mobile application
for sending, receiving, confirming and responding to alerts,
messages, and notifications via wireless communications
networks or the Internet; downloadable computer software in
the nature of desktop software applications for providing
desktop notifications that capture the user's attention with
audio-visual signals and allow users to confirm, respond to
notifications or receive additional information related to
notifications; downloadable computer software for use in
threat prevention, detection, investigation, response,
remediation and analysis for computers, computer systems,
servers, computer networks, endpoints, mobile devices,
enterprise of things (EOT) and internet of things (IoT)
enabled devices; computer software for managing computer
network endpoint security and predicting and monitoring
security threats to computer networks; downloadable computer
operating system programs; downloadable computer software
for performing data security functions in the field of
cryptographic network security; downloadable computer
software for automating a process for authentication of
identity using existing databases in connection with the
issuance and management of digital certificates used for
authentication or encryption of digital communications over
the Internet and other computer networks; downloadable
computer software, namely, encryption software to enable
secure transmission of digital information; downloadable
computer software to integrate managed security, namely,
virtual private network (VPN), public key infrastructure
(PKI), digital certificate issuance, verification and
management; cloud computing software; downloadable Internet
of things (IOT) management software platform consisting of
downloadable cloud-based software, mobile and desktop
applications, and premise-based gateway agent software;
downloadable computer software for use in managing
device-to-device, device-to-cloud and cloud-to-device
communications; downloadable computer software for
machine-to-machine (M2M) communication, remote data
collection and process control; downloadable computer
software for asset tracking; downloadable computer software
to track and manage IP-enabled machines and other connected
devices; downloadable software Development Kits (SDKs),
Application Programming Interface (API) software, and
Enterprise Application Integration (EAI) software for
creating software and applications related to machine to
machine (M2M) devices, network and Internet connected
devices, and IOT devices; downloadable computer software for
sending, receiving and analyzing data from network and
Internet-connected devices; downloadable computer software,
namely, software and middleware used to allow software
applications to interface with mobile and remote devices and
to allow connectivity, memory storage, and device
management, all via a computer network; downloadable
computer software and hardware for fleet asset tracking in
the transportation industry; downloadable computer software
and hardware for tracking and managing IP-enabled machines;
downloadable computer software and hardware to collect,
filter and process electronic data, namely, audio, voice,
video, images, text, electronic mail and messaging,
documents, and vehicle and driver telematics and analytics
concerning driver behavior, vehicle diagnostics,
maintenance, performance, location, and downtime;
downloadable computer software systems for use in dispatch,
video monitoring, driver compliance, driver performance,
driver scorecards, document management, trailer tracking,
asset tracking, vehicle tracking, telematics, fuel economy
tracking, driver workflow, integrations with third party
software, vehicle utilization, temperature tracking, vehicle
inspection reports; mobile phones, smart phones, tablet
computers and wireless communication devices for voice,
data, or image transmission; accessories for mobile phones,
smart phones, tablet computers and wireless communication
devices, namely, headsets and earphones, phone chargers,
battery chargers, mounts, cradles and holders for hands-free
phone use, charging and docking stations, cell phone and
tablet computer protective cases, protective covers and
cases for handheld electronic devices, cell phone holsters,
and speakers; downloadable computer software for mobile
phones, portable media players, and handheld computers,
namely, software for sending digital photos, videos, images,
and text to others via the global computer network;
downloadable computer software in the fields of Mobile
Device Management (MDM), Mobile Applications Management
(MAM), Mobile Security Management (MSM), Mobile Information
Management (MIM), and mobile Identity and Access Management
(IAM); downloadable computer software to allow network
administrators to monitor, manage, and quarantine devices
that are granted access to a network
38
Providing secure mass notification services through all
communication devices, telephones, tablets, smartphones,
email, text messaging, and instant messaging; providing
electronic transmission of data and digital messaging via
mobile handheld devices and via wired and wireless
communication devices before, during and after critical
situations; telecommunications services that enable users
and organizations to electronically transmit messages, text,
multimedia content, videos, audio, animation and images via
a global computer network before, during and after critical
situations; providing multiple user access to interactive
databases through web sites on a global computer network to
manage, administrate and use crisis communication
capabilities; providing electronic transmission of converged
data, address location information, text, pictures, and
streaming media, all for use in crisis communications;
providing telecommunication connectivity services for
transfer of messages, audio, visual, and data information
for crisis communications; secure electronic messaging
services, namely, providing services to access, process, and
transmit critical, time-sensitive notifications to
individuals and organizations; telecommunication services,
namely, data transmission and reception services via
telecommunications networks; electronic exchange of voice,
data, audio, video, text and graphics accessible via
computer and telecommunications networks; instant messaging
services; providing secure electronic message alerts via the
Internet, global computer and telecommunications networks
42
Providing temporary use of non-downloadable computer
software for measuring, assessing, identifying, detecting,
analyzing, preventing, and responding to cybersecurity
threats, attacks, risks, and vulnerabilities; providing
temporary use of non-downloadable software for artificial
intelligence, analytics-based machine learning, and deep
learning software, all for the purpose of measuring,
detecting, analyzing, preventing and responding to
cybersecurity attacks; design and development of crisis
communication systems comprised of computer hardware and
software; engineering and systems analysis in the field of
crisis communication systems; computer services, namely,
providing online system management services that allow users
to remotely view, monitor, program, operate and control
crisis communication systems; research in the field of
crisis communication technology; testing of crisis
communication systems comprised of computer software and
hardware; cloud computing featuring software for providing
crisis communication through multiple IP network channels
and delivery services; computer services, namely,
integration of private and public cloud computing
environments for crisis communication; computer services,
namely, cloud hosting provider services for crisis
communication; computer services, namely, installation of
computer software for private cloud computing for crisis
communication; consulting services in the field of cloud
computing for crisis communication; computer services,
namely, creating an online community for registered users to
participate in discussions, get feedback from their peers,
form virtual communities, invite other organizations to the
community and engage collaboration in the field of security
and crisis communication and management; providing temporary
use of online non-downloadable software featuring software
for use in sending, receiving, confirming and responding to
alerts, messages, and notifications in the field of crisis
communication and management; providing temporary use of
online non downloadable software featuring software for use
in sending, receiving, confirming and responding to alerts,
messages, and notifications in the field of crisis
communication and management; providing temporary use of
online non-downloadable software, namely, hosting software
for use by others for use in sending, receiving, confirming
and responding to alerts, messages, and notifications in the
field of crisis communication and management; providing
online non-downloadable computer software for the purposes
of data collection, monitoring, and mass notification
services for managing emergency and crisis situations and
improving crisis communications capability; providing
temporary use of on-line non-downloadable computer software
for endpoint security, malware analysis, vulnerability
testing, penetration testing, and vulnerability assessment;
providing temporary use of online non downloadable computer
software for endpoint security, malware analysis,
vulnerability testing, penetration testing, and
vulnerability assessment; providing temporary use of online
non-downloadable software for use in threat prevention,
detection, investigation, response, remediation and analysis
for computers, computer systems, servers, computer networks,
endpoints, mobile devices, and internet of things (IoT)
enabled devices; providing temporary use of online
non-downloadable software for predicting and monitoring
security threats to computer networks; providing temporary
use of online non-downloadable software for preventing
unauthorized access to computers and computer networks;
providing temporary use of online non-downloadable software
for data analytics; design, development and maintenance of
online computer software systems and software for operation
and control of autonomous-driving vehicles; providing
temporary use of online non-downloadable software for
operation and control of autonomous-driving vehicles;
providing temporary use of non-downloadable software
applications and software development tools and platform as
a services (PAAS) featuring computer software platforms that
enable software developers to program and users to build and
configure software applications that work in conjunction
with such non-downloadable software applications and
platforms to transfer, share, format, manipulate and
integrate data, information and such developer software
applications working in conjunction with and between such
non-downloadable software applications and platforms and
third party services; providing temporary use of online
non-downloadable software featuring computer software in the
field of electronic file security to allow users to encrypt,
electronically watermark, provide restricted access to, and
provide secure transmission and tracking of electronic
documents and other electronic and digital files; platform
as a services (PAAS) featuring computer software platforms
for creating, managing, and deploying cloud computing
infrastructure services; design and development of on-line
computer software systems, computer hardware and computer
software; technical support services, namely, installation,
administration, and troubleshooting of web and database
applications; providing machine-to-machine (M2M) and
Internet of Things (IoT) communication integration services,
namely, the integration of disparate computer systems,
networks, hardware and software through the application of
wireless communication, artificial intelligence, machine
learning and/or deep learning technology to facilitate M2M
and IoT communication via web based browsers, personal
digital assistants, mobile phones, embedded microprocessors,
sensors and other electronic devices; providing temporary
use of online non-downloadable software applications,
software developer kits (SDKs) and software development
tools, and platform as a service (PAAS) featuring computer
development platforms that enable software developers to
design, test, deploy, manage, and monitor internet of things
(IoT) and machine-to-machine (m2m) devices; computer
software services, namely, development, maintenance, repair,
installation, and troubleshooting of computer software
problems, support in the nature of diagnosing computer
software problems, upgrade and updating computer software,
authoring computer software, provision of computer software
information, and consultation, design and customization of
computer software and middleware; computer security
consultancy; technical consulting and assistance with
computer machine (m2m) devices; computer software services,
namely, development, maintenance, repair, installation, and
troubleshooting of computer software problems, support in
the nature of diagnosing computer software problems, upgrade
and updating computer software, authoring computer software,
provision of computer software information, and
consultation, design and customization of computer software
and middleware; computer security consultancy; technical
consulting and assistance with computer-based information
systems and components, namely, technical consulting
services in the fields of Mobile Device Management (MDM),
Mobile Applications Management (MAM), Mobile Security
Management (MSM), Mobile Information Management (MIM),
mobile Identity and Access Management (IAM), datacenter
architecture, public and private cloud computing solutions,
cybersecurity, and evaluation and implementation of internet
technology and services; Software-as-a-service (SAAS) in the
nature of a secure web hosting platform for allowing users
and enterprise software applications to interface with
remote devices and to allow connectivity, memory storage,
device management, device monitoring, device tracking, and
device auditing via a computer network and providing
temporary use of on-line non-downloadable software related
thereto; providing temporary use of online non-downloadable
software featuring software for Enterprise Mobility
Management (EMM), Unified Endpoint Management (UEM), Mobile
Device Management (MDM), Mobile Applications Management
(MAM), Mobile Security Management (MSM), Mobile Information
Management (MIM), and mobile Identity and Access Management
(IAM); providing temporary use of online non-downloadable
software for the operation, management, security and
maintenance of enterprise networks, data center management,
resource management and performance optimization
Die Bezeichnungen wurden automatisch übersetzt. Übersetzung anzeigen