42 Programming of computer software for others; customized software development in the fields of securing and authenticating information at rest and in transit, including identification information, location information, on products, and protecting against counterfeiting and brand monitoring, identifying and distinguishing authentic, genuine, products from counterfeit products, and collecting data and reporting; Installation, maintenance, and implementation of computer software for purposes of securing and authenticating information at rest and in transit, including identification information, location information, on products, and protecting against counterfeiting and brand monitoring, identifying and distinguishing authentic, genuine, products from counterfeit products, and collecting data and reporting; Implementation of computer technologies for others for purposes of securing and authenticating information at rest and in transit, including identification information, location information, on products, and protecting against counterfeiting and brand monitoring, identifying and distinguishing authentic, genuine, products from counterfeit products, and collecting data and reporting; Computer systems integration services for purposes of protecting against counterfeiting and brand monitoring, identifying and distinguishing authentic, genuine, products from counterfeit products, and collecting data and reporting; non-downloadable software and other technology solutions for purposes of securing and authenticating information at rest and in transit, including identification information, location information, on products as well as protecting products against counterfeiting and providing branding monitoring, including identifying and distinguishing authentic, genuine, products from counterfeit products, and collecting data and reporting