Goods and Services | Recorded and downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; recorded and downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; recorded and downloadable computer application software for gateways, laptops, desktops, servers, mobile device, and Internet of Things (IoT) devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; protection devices for cybersecurity protection, namely, gateway routers, laptops, desktop computers, computer servers, mobile hotspot device, and Internet of Things (IoT) devices in the nature of home automation hubs comprised of voice-activated speakers, computer hardware, and recorded software for controlling networked devices in the internet of things (IoT); recorded and downloadable computer software for providing cybersecurity, endpoint security and data protection and privacy; recorded and downloadable computer software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; recorded and downloadable computer software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability assessment; recorded and downloadable computer software that enable software developers to design, test, deploy, manage, and monitor Internet of Things (IoT) and machine-to-machine (m2m) devices; downloadable computer programs using artificial intelligence for use in machine learning for human understanding of information |
Goods and Services | Platform-as-a-service (PaaS) featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-service (SaaS) services featuring software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; providing on-line non-downloadable software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; platform-as-a-service (PaaS) featuring software for gateways, laptops, desktops, servers, mobile device, and Internet of Things (IoT) devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; platform-as-a-service (PaaS) featuring software for providing cybersecurity, endpoint security and data protection and privacy; platform-as-a-service (PaaS) featuring software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; platform-as-a-service (PaaS) featuring software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability risk assessment; platform-as-a-service (PaaS) featuring software that enables software developers to design, test, deploy, manage, and monitor Internet of Things (IoT) and machine-to-machine (m2m) devices; software-as-a-service (SaaS) featuring software for gateways, laptops, desktops, servers, mobile device, and Internet of Things (IoT) devices, namely, software for cybersecurity, computer and network security, and prevention of computer and network risks purposes; software-as-a-service (SaaS) featuring software for providing cybersecurity, endpoint security and data protection and privacy; software-as-a-service (SaaS) featuring software for measuring, assessing, identifying, detecting, analyzing, preventing, and responding to cybersecurity threats, attacks, risks, and vulnerabilities; software-as-a-service (SaaS) featuring software for endpoint security, malware analysis, vulnerability testing, penetration testing, and vulnerability risk assessment; software-as-a-service (SaaS) featuring software that enables software developers to design, test, deploy, manage, and monitor Internet of Things (IoT) and machine-to-machine (m2m) devices; cybersecurity services in the nature of restricting unauthorized access to computer systems; technology consultation in the field of cybersecurity; computer security threat analysis for protecting data; platform-as-a-service (PaaS) featuring computer software platforms for privacy-preserving and cyber-protected cybersecurity edge AI and edge computing, distributed peer-to-peer (P2P) and federated learning cybersecurity AI trained models; software-as-a-service (SaaS) services featuring software for privacy-preserving and cyber-protected cybersecurity edge AI and edge computing, distributed peer-to-peer (P2P) and federated learning cybersecurity AI trained models; platform-as-a-service (PaaS) featuring software for use in database management, for word processing, for data model development in the fields of intelligence, infrastructure, and cybersecurity solutions; software-as-a-service (SaaS) services featuring software for use in database management, for data model development, for word processing in the fields of intelligence, infrastructure, and cybersecurity solutions; platform-as-a-service (PaaS) featuring software for use in transmission of information, database management, for data model development, for word processing in the fields of supporting hardware and telecommunications and communications software; software-as-a-service (SaaS) featuring software for use in transmission of information, database management, for data model delivery, for word processing in the fields of supporting hardware and telecommunications and communications software; computer technical support services, namely, 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; engineering services, namely, engineering design for military vehicle; technology consultation in the field of artificial intelligence; research in the field of artificial intelligence; software-as-a-service (SaaS) services featuring software using artificial intelligence for use in machine learning for human understanding of information |