42 Design and development of computer hardware and software; Information technology (IT) consulting services; Providing technical advice relating to operation of computer hardware and software; Design, testing, installation, integration, hosting, and updating of software and computer programs; Software as a service (SaaS) services featuring a full line of non-downloadable software excluding software for use with laboratory equipment in the nature of automated sample handling equipment, clinical laboratory analyzers, and chemistry analyzers; Providing a full line of on-line non-downloadable software excluding software for use with laboratory equipment in the nature of automated sample handling equipment, clinical laboratory analyzers, and chemistry analyzers; Platform as a Service (PaaS) featuring a full line of computer software platforms excluding software platforms for use with laboratory equipment in the nature of automated sample handling equipment, clinical laboratory analyzers, and chemistry analyzers; Computer security consultancy and assessments; Computer anti-virus protection services, namely, providing temporary use of non-downloadable computer anti-virus software; Provision of security services for computer software, computer networks, and computer systems, namely, computer security services in the nature of administering digital certificates, computer security consultancy in the field of scanning and penetration testing of computers and networks to assess information security vulnerability, Internet security consultancy, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials; Research in the fields of information technology and computer security; Cybersecurity services, namely, computer security threat analysis for protecting data, and providing cybersecurity risk assessments of electronic information and computer systems; Infrastructure as a Service (IaaS) in the nature of providing virtual computer systems, computer networking and storage equipment, virtual firewalls, and electronic storage of data through cloud computing; Providing virtual computer environments through cloud computing; Computer and technical support services, namely, troubleshooting of computer software problems; 24/7 service desk or help desk services for IT infrastructure, operating systems, database systems, and web applications; Recovery of computer data; Operating and outsourcing of computer data centers for others, namely, outsource service provider in the field of operation of computer data centers for others; Computer services, namely, computer system administration for others; Database development services; Maintenance of online databases for others; Design, development, configuration, and integration of computer systems and networks; Monitoring of computer systems to ensure proper functioning; Cloud hosting provider services; Cloud migration services in the nature of migration of computer software to the cloud for others; Cloud computing in the nature of management services for monitoring, administration and management of public, hybrid, and private cloud computing IT and application systems; Cloud services, namely, integration of private and public cloud computing environments; Computer services, namely, providing online portals that enable employees of an enterprise to access and install computer software applications from such enterprise's online software application store; Providing a web-based system and online portal for users to remotely manage, lock, unlock, wipe data on, and locate mobile and wireless devices; Research in the field of information technology; Data security services, namely, data security consultancy, and data encryption services; Data migration services; Electronic data storage; Remote computer backup services; Encryption and decryption of information, messages and data; Authentication of information, messages and data, namely, using technology to authenticate user identity in computer systems and networks; Administration of user rights in computer networks; Computer disaster recovery services; Product research, design, and development; Authentication, issuance and validation of digital certificates; Electronic identification verification services using technology to authenticate users identity; Outsource service provider in the field of information technology consulting; Information, consultancy and advisory services relating to all the foregoing services