Goods and Services | home automation and home device integration software; wireless controllers to monitor and control the functioning of other electronic devices; computer software for accessing, browsing and searching online databases; computer software for use in administering and maintaining computer networks; computer software for implementing computer, software and network security measures; voice-enabled software applications for personal information management; computer software for connecting, operating, integrating, controlling, and managing networked consumer electronic devices, home climate devices and lighting products via wireless networks; computer software used for voice-enabled control of software and hardware devices; downloadable security software, namely, software for web security testing, detecting and reporting web security vulnerabilities, detecting and reporting server vulnerabilities and advising on remedial action pertaining to web security and server security vulnerabilities; computer software for use on electronic devices; enterprise security software; computer software for dictation; computer software, recorded, in the field of cyber security, namely, for web security testing, detecting and reporting web security vulnerabilities, detecting and reporting server vulnerabilities and advising on remedial action pertaining to web security and server security vulnerabilities; computer software for use to connect and control internet of things (IoT) electronic devices; computer software for scheduling appointments, reminders, and events on an electronic calendar, for creating tasks, and for drafting and sending electronic mail messages.; personal digital assistant, electronic organizer incorporating software for informational retrieval; speech to text conversion software; computer software for e-commerce protection; personal assistant software; Downloadable voice command and recognition software; downloadable and recorded computer software for monitoring, testing, and reporting the performance of computer applications and networks.; computer software for accessing and controlling software applications; downloadable mobile applications in the field of cyber security, namely, for web security testing, detecting and reporting web security vulnerabilities, detecting and reporting server vulnerabilities and advising on remedial action pertaining to web security and server security vulnerabilities; downloadable and recorded computer software for protecting and securing computer networks and applications; voice processing software; voice recognition software; computer software for intrusion detection; downloadable computer software in the field of cyber security, namely, for network security testing, detecting and reporting security vulnerabilities, detecting and reporting server vulnerabilities and advising on remedial action pertaining to web security and server security vulnerabilities; computer software used to process voice commands, and create audio responses to voice commands; personal digital assistant; computer software for scheduling appointments, reminders, and events on an electronic calendar; anti-malware software applications, computer software for providing network, Internet, and computer security, computer software for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Computer software for data security and protection; computer software for use as an application programming interface (API); voice-activated software |
Goods and Services | Software as a service (SaaS) featuring computer software used for dictation; Software as a service (SaaS) featuring computer software used for network security testing, detecting and reporting security vulnerabilities, detecting and reporting server vulnerabilities and advising on remedial action pertaining to web security and server security vulnerabilities; Software as a service (SaaS) featuring computer software used for intrusion detection, anti-malware software applications; Software as a service (SaaS) featuring computer software used for web security testing, detecting and reporting web security vulnerabilities, detecting and reporting server vulnerabilities and advising on remedial action pertaining to web security and server security vulnerabilities; Software as a service (SaaS) featuring computer software used for accessing, browsing and searching online databases; Software as a service (SaaS) featuring computer software used for speech to text conversion; Software as a service (SaaS) featuring computer software used for connecting, operating, integrating, controlling, and managing networked consumer electronic devices, home climate devices and lighting products via wireless networks; Software as a service (SaaS) featuring computer software used for protecting and securing computer networks and applications; Software as a service (SaaS) featuring computer software used for e-commerce protection; Software as a service (SaaS) featuring computer software used for accessing and controlling software applications; Software as a service (SaaS) featuring computer software used for home automation and home device integration; Software as a service (SaaS) featuring computer software used for implementing computer, software and network security measures; Software as a service (SaaS) featuring computer software used for data security and protection; Software as a service (SaaS) featuring computer software used for connecting and controlling internet of things (IoT) electronic devices; Software as a service (SaaS) featuring computer software used for monitoring and controlling the functioning of other electronic devices; Software as a service (SaaS) featuring computer software used for scheduling appointments, reminders, and events on an electronic calendar, for creating tasks, and for drafting and sending electronic mail messages.; Software as a service (SaaS) featuring computer software used for providing network, Internet, and computer security; Software as a service (SaaS) featuring computer software used for processing voice commands, and creating audio responses to voice commands; Software as a service (SaaS) featuring computer software used for personal assistant software; Software as a service (SaaS) featuring computer software used for scanning, detecting, and removing viruses, worms, Trojan horses, adware, spyware, and other malware; Software as a service (SaaS) featuring computer software used for monitoring, testing, and reporting the performance of computer applications and networks.; Software as a service (SaaS) featuring computer software used for controlling stand-alone computing devices; Software as a service (SaaS) featuring computer software used for administering and maintaining computer networks; Software as a service (SaaS) featuring computer software used for enterprise security; Software as a service (SaaS) featuring computer software used for voice-enabled control of software and hardware devices |