9
Computer hardware; computer hardware appliances that provide fire wall, content filtering, intrusion alert, virus protection, virtual private networking and other security functions; computer software; computer software in the field of cryptographic network security and data security functions; computer software for integration of information logic and data between computer networks; computer software for automating a process for authentication of identity using existing databases in connection with the issuance and management of digital certificates used for authentication or encryption of digital communications, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer networks; computer software, namely, encryption software to enable secure transmission of digital information, namely, confidential, financial and credit card information over the Internet, as well as over other modes of communication between computing devices; computer software to integrate managed security services, namely, public key infrastructure (PKI) services, digital certificate issuance, verification, management and enterprise software integration, with existing communications networks, software and services; computer software for use in analysis and reporting of firewall log data; computer software platform for bridging Internet and telephony services and enabling users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; computer software platform for providing faster Internet connections, website resolution and e-mail deliveries; computer antivirus software; Internet security software; enterprise security software; intrusion detection software; firewall software; privacy control software; content filtering software; cloning software, namely, software for cloning computer hard drives, software for cloning computer operating systems, software for cloning data files, software reconfiguring personal computers; computer software for the creation of virtual private network; computer software and downloadable computer software, namely, utility software; computer utility software for removal of computer applications and software; utility software for facilitating computer use at remote locations and for facilitating communications among mobile users over networks; computer software, namely, middleware for interfacing client applications and networked or host based databases; computer software and downloadable computer software for use in updating other computer software; computer software for use in networking applications; computer software for sending and receiving facsimile transmissions from computers and notebook computers; computer software for connecting and managing remote computers, for synchronization of files through e-mail, for providing security to remote computer users, for implementing computer, software and network security measures for remote computer users; computer software for file management and transfer; computer software for telecommuting, namely, for connecting to and use of a remote computer network, a remote computer and mobile devices; computer communications software for use with a home or remote office for connecting computer network users to global networks; computer software and databases for use in diagnosis, repair and configuration of computers, computer software and computer peripherals; computer programs for data communications applications, and for the encryption and authentication of electronic information; computer software for identity security; computer software for authentication and identity management information security; computer software for digital information and data access; computer software for detecting identity fraud; computer software and firmware for the management, transmission, and storage of data and information; computer software for use in networking computers; computer software for use in computer emulation; computer software for use in operating electronic mail; computer software for use in operating voice mail and voice messaging; computer software for use in database management; computer software for use in monitoring computers for security purposes; computer software for use with computer servers for controlling and managing server applications; computer telephony software; computer software for use in accessing databases; downloadable electronic publications in the nature of user manuals, white papers, articles, and technical documentation manuals in the fields of computer hardware and software, digital telecommunications, consumer electronics, and information technologies
35
Providing data collection, storage and retrieval services
38
Providing data access and delivery services
42
Providing authentication of identity; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support issuance and management of digital certificates; creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; on-line technical support services, namely, troubleshooting of computer hardware and software problems; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization of Internet and network firewall software for others; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; computer software consultation services for the development of software applications; designing and programming computer controlled communications systems; providing data conversion services; provision of security services for virtual private computer networks (VPNs); application hosting; web hosting; consulting in the field of computers and computer networks, namely, turnkey e-commerce services; computer services, namely, providing a computer software platform that bridges Internet and telephony services and enables users to communicate and transact business faster across multiple networks via wire line phones, mobile phones, personal computers, PDAs and other personal electronic devices; providing a computer software platform that provides faster Internet connections, web site resolution, and email delivery; services that support the on-boarding, formatting, distribution, translation, and mediation of digital content for distribution via networks; directory, discovery, and information services associated with Radio Frequency ID (RFID) and the Electronic Product Code (EPC) network; application service provider (ASP) featuring billing and customer relationship management software for wireless service providers; data automation and collection service using proprietary software to evaluate, analyze, and collect service data from communications carriers; data conversion of computer program data or information from communication carriers; application service provider (ASP), namely, hosting computer software applications for others; cross-platform conversion of digital content into other forms of digital content for distribution via networks; providing temporary use of on-line, non-downloadable software for storing, managing, tracking and analyzing data in the field of Radio Frequency ID (RFID) and the Electronic Product Code (EPC); designing, creating or maintaining of computer programs for computer networks using Radio Frequency ID (RFID) and the Electronic Product Code (EPC); hosting of digital content over the Internet for use in wireless communications and with wireless communication equipment and apparatus; computer consultation in the field of computer security; computer software installation services; computer programming; notification and delivery of software updates; research services relating to computer hardware and computer software; technical consultation in the field of computer software installation and maintenance; computer support services, namely, technical support and software update services; computer consulting services related to computer products and services; computer software design for others; providing information in the field of new computer software applications, using computers at remote locations, and other computer and technology related issues; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; scientific and technological services, namely, technology consultation in the fields of computers, computer hardware, computer software, computer peripherals, computer systems, computer networks, computer security, information technology, electronic commerce technology and global computer network technology, communications networks and devices, consumer electronics, mobile computing, and telecommunications equipment and devices; providing consultants to help deploy, supervise and manage information technology projects; providing information in the field of information technology relating to communications devices, computers, computer hardware, computer software, computer peripherals, and computer networks; providing hosted electronic mail and instant messaging services; business services in the nature of managed public key infrastructure (PKI) services, namely, application and network infrastructure security services; providing identity verification services in e-commerce transactions; business management, namely, issuance of digital certificates for authentication; monitoring of computer systems for security purposes; providing information in the fields of global computer network and local area network security, preventing computer viruses, computer hardware and software applications in security