9
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
cybersecurity hardware; cybersecurity software, namely, software for use in monitoring, visualizing, assessing and protecting computer systems and predicting, assessing, preventing, analyzing, tracking and defeating unauthorized access to and use of computer systems; computer network security hardware and software; computer hardware and software for alerting users to changes in computer network conditions and to cybersecurity threats to computer systems
42
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
consulting in the field of cybersecurity; computer network security consulting services; computer network consulting services, namely, providing analysis and assessment of computer network vulnerabilities for use in helping others achieve security goals and better protect their networks; consulting services in the field of cybersecurity, namely, consulting services for the design, analysis, implementation, testing and operation of security systems for computer systems and networks to enable others to better protect their computer networks and systems; consulting services in the field of cybersecurity intelligence, namely, providing consultation regarding the monitoring, visualization, assessment and protection of computer systems and the prediction, assessment, prevention, analysis, tracking and defeat of unauthorized access to and use of computer systems to enable others to better protect their computer networks and systems