VEILED TECHNOLOGIES
Computer hardware and virtual hardware, namely, servers and network operating centers for use in the encryption, decryption and protection of data, including audio, video, text, images, graphics and multimedia files, transmitted via a network; computer software, namely, endpoint software and server software for use in the encryption, decryption and protection of data, including audio, video, text, images, graphics and multimedia files, transmitted via a network; computer services, namely, est...
Abandoned · January 27, 2014 · 86176641 ·