42 Scientific and technological services and research and design relating thereto; design and development of computer hardware and software; data security services; cloud computing; cloud computing services; computer network configuration services; computer network services; computer programming; computer software consulting; computer software design; computer software development; computer software maintenance; computer software rental; computer software technical support services; configuration of computer networks by software; consultancy services relating to computer networks; consulting services in the field of cloud computing; creation, maintenance and adaptation of software; data encryption services; encryption, decryption and authentication of information, messages and data; information services relating to the development of computer networks; monitoring of network systems; programming of operating software for accessing and using a cloud computing network; providing information about the design and development of computer hardware and software; providing virtual computer environments through cloud computing; providing virtual computer systems through cloud computing; rental of computer software; software as a service (SaaS) featuring anti-ad software; software as a service (SaaS) featuring anti-malware software; software as a service (SaaS) featuring anti-spam software; software as a service (SaaS) featuring anti-spyware software; software as a service (SaaS) featuring anti-tracking software; software as a service (SaaS) featuring privacy violation detection software; software as a service (SaaS) featuring web content filtering software; software as a service (SaaS) for providing data compression software; software as a service (SaaS) for providing traffic routing of data; software as a service [SaaS]; software creation; software engineering; technological advisory services relating to computer programs; electronic storage of archived e-mails; updating of computer software; design and development of virtual private network (VPN) operating software; monitoring of computer systems by remote access; providing information concerning encryption of electronic data for website and e-commerce transaction security; encryption and decryption of data; computer services, namely, on-line scanning and detecting of malware on websites; technical and customer support services, namely, troubleshooting of computer software problems; development, design, and implementation services in the field of security, access, authorization, authentication encryption, and identification systems for computers, and computer networks, namely, installation of computer software; computer systems analysis in the field of security, access, authorization, authentication encryption, and identification systems for computers and computer networks; issuance and management of digital certificates for authentication or encryption of a digital communication, or authentication of a digital signature in an electronic transaction or communication, over the Internet and other computer network and providing technical and customer support in connection therewith; development, design, implementation, testing, analysis, and consulting services in the field of security, access, authorization, authentication encryption, and identification systems for computers, computer hardware and computer networks; development, integration and operation of computer systems to support creation and implementation of procedures and practices for issuance and management of digital certificates; computer related services, namely, managed computer network and Internet security services, namely, public key infrastructure (PKI) verification, authentication, distribution and management, digital certificate issuance, verification and management, and enterprise software integration; computer services, namely, providing search engines for obtaining data on a global computer network; computer consultation regarding computer networks and internal computer networks, security services for computer networks and internal computer networks, namely, installation, design and customization; enterprise software integration; computer consulting services in the field of security integration, network security, network architecture, encryption technology, and computer security; security verification of computer network firewalls, servers and other network devices from unauthorized access, namely, analyzing global computer information network and internal computer network vulnerability; application hosting; scanning, and detection of viruses, worms, trojan horses, adware and spyware or any other type of malware; computer services, namely, detection of viruses and threats; design and implementation of software and technology solutions for the purposes of protecting against counterfeiting, tampering and diversion, and to ensure the integrity of genuine websites; application service provider services, namely, providing on-line, non-downloadable software for computer security testing in the fields of computer and Internet security; software as a service for use in scanning networks and websites to detect and identify vulnerabilities and malware; authentication, issuance and validation of digital certificates; identification verification services, namely, providing authentication of business identification information; computer security services in the nature of providing an Internet trust center, namely, computer security assurance and administration of digital keys and digital certificates; providing user identity authentication services in e-commerce transactions; information, consultancy and advisory services relating to all of the aforesaid; Artificial intelligence consultancy; Research in the field of artificial intelligence; Technology consultation in the field of artificial intelligence