9
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
downloadable computer software and mobile applications featuring artificially intelligent bots, virtual agents and virtual assistants for endpoint monitoring and cloud event monitoring in the fields of network security, enterprise security, and cloud security; downloadable network security software and mobile applications featuring artificially intelligent bots, virtual agents, and virtual assistants that monitor, investigate, and analyze networks for security events; downloadable network security software and mobile applications featuring artificially intelligent bots, virtual agents, and virtual assistants that provide notifications, alerts, and recommendations concerning network security events
42
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
providing temporary use of on-line non-downloadable software featuring artificially intelligent bots, virtual agents and virtual assistants for endpoint monitoring and cloud event monitoring in the fields of network security, enterprise security, and cloud security; providing temporary use of on-line non-downloadable network security software featuring artificially intelligent bots, virtual agents, and virtual assistants that monitor, investigate, and analyze networks for security events; providing temporary use of on-line non-downloadable network security software featuring artificially intelligent bots, virtual agents, and virtual assistants that provide notifications, alerts, and recommendations concerning network security events; monitoring of computer systems for security purposes, namely, monitoring of computer systems for detecting unauthorized access or data breach, and monitoring of computer systems by remote access to ensure proper functioning