09
Recorded and downloadable computer programs and software;
computer programs and software for searching and analyzing
performance measures of computers and other computer
hardware in computer networks and generating reports on
technology operation status and trends, in graphic or text
form; computer programs and software for providing automated
or assisted service to end users, or gathering user feedback
and comments, based on search or analysis of the performance
measures of computers and other computer hardware in
computer networks; computer programs and software for the
security of computing networks and computer networks, user
authentication, detecting intrusion, analyzing user
experience and device behavior, and presenting analysis of
user experience and device behavior in graphic or text form
42
Scientific and technological services and related research
and design services; industrial analysis and research
services; design, development, installation, updating,
maintenance and rental of computer programs and software;
design, development, installation, updating, maintenance and
rental of computer programs and software for the security of
computing networks and computer networks, user
authentication, detecting intrusion, analyzing user
experience and device behavior and presenting analysis of
user experience and device behavior in graphic or text form;
design, development, updating, and rental of computer
programs and software for the analysis of computer network
operations and user interactions; design, development,
updating, and rental of computer programs and software for
the security of computing networks and computer networks,
user authentication, detecting intrusion, analyzing user
behavior and presenting user behavior on computing networks
in graphic or text form; cloud computing; computer
programming; computer system analysis; computer technology
consultancy; monitoring of computer systems by remote
access; monitoring of computer systems to detect
breakdowns; electronic monitoring services for computer
security threat analysis for protecting data; monitoring of
computer systems for detecting unauthorized access or data
breach; information technology services provided on an
outsourcing basis; computer software technical support
services; computer software consulting services;
technological consultancy