09
Computer programs and recorded and downloadable software;
computer programs and software for searching and analyzing
performance measures of computers and other hardware in
computer networks and generating reports on technology
operation status and trends, in graphic or text form;
computer programs and software for providing automated or
assisted services to end users, or gathering user feedback,
based on search or analysis of the performance measures of
computers and other hardware in computer networks; computer
programs and software for the security of computing networks
and computer networks, user authentication, detecting
intrusion, analyzing user experience and device behavior,
and presenting analysis of user experience and device
behavior in graphic or text form
42
Scientific and technological services and related research
and design services; Industrial analysis and research
services; design, development, installation, updating,
maintenance and rental of computer programs and software;
design, development, installation, updating, maintenance and
rental of computer programs and software for the security of
computing networks and computer networks, user
authentication, detecting intrusion, analyzing user
experience and device behavior and presenting analysis of
user experience and device behavior in graphic or text form;
design, development, updating, and rental of computer
programs and software for the analysis of computer network
operations and user interactions; design, development,
updating, and rental of computer programs and software for
the security of computing networks and computer networks,
user authentication, detecting intrusion, analyzing user
behavior and presenting user behavior on computing networks
in graphic or text form; cloud computing; computer
programming; computer system analysis; computer technology
consultancy services; monitoring of computer systems by
remote access; monitoring of computer systems to detect
breakdowns; electronic monitoring services for computer
security threat analysis for protecting data; monitoring of
computer systems for detecting unauthorized access or data
breach; outsourcing services related to information
technology services; computer software technical support
services; computer software consulting services;
technological consultancy services