9 Data processing equipment and computers; solid and mechanical storage arrays; recorded tapes, discs, computer discs, CDs, DVDs, and CD-ROMs in the field of information technology; recorded computer software for managing, monitoring and protecting the operation of information technology systems and to enable the business use of information technology systems, computer hardware and recorded computer based information systems software for managing, monitoring and protecting the operation of information technology systems and to enable the business use of information technology systems; read-only memories recorded on compact discs; downloadable, recorded computer programs and computer software for managing, monitoring and protecting the operation of information technology systems; computer hardware; none of the foregoing being image recognition, image processing or medical software or financial software; parts and fittings, namely, parts and fittings required to fulfill a data centre or managed service project, namely, PDU power controls, network cables, computer patch panels, UPS units, UPS batteries; equipment to operate information technology systems, namely, servers and components commonly found in servers, namely, Processors/Central Processing Units (CPU), Memory/Random Access Memory (RAM) Card, Motherboards, Network Interface Controller (NIC)/Network Cards, electrical Power Supplies, Graphics Processing Units (GPU), storage components commonly found in such equipment, namely, Storage Area Networks (SAN), Network Attached Storage (NAS), Storage arrays, Hard Drives including, namely, Hard Disk Drives (HDD), Serial AT Attachment (SATA), Serial Attached SCSI (SAS), Internet Small Computer Interface (iSCI), Fibre Channel, Solid State Drive (SSD), Just a Bunch of Disks (JBODs), networking components commonly found in such equipment, namely, Firewalls, Switches, Routers, small form-factor pluggable (SFP) Modules, Optical Cables, Stacking modules, recorded Threat Management Software, computer Network switches, Unified Threat Management (UTM) Firewalls, Remote Access Appliances, Loadbalancer Appliances, Bandwidth Acceleration Appliances, Content Filtering Appliances, Web Application Firewalls, Kernel Virtual Machine (KVM's)