42 Scientific and technological services and research and design relating thereto; industrial analysis, industrial research; information technology [IT] consultancy; rental of computer software; technical support services, namely, troubleshooting of computer software problems; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, remote administration and management of in-house and hosted datacenter devices; technical support services, namely, technical advice related to the repair of software; technical support services, namely, technical advice related to the installation of software; software design and development services; technical consultancy services in the field of evaluation and implementation of information technology (IT) services, namely, computer systems analysis; technical support services for managing infrastructure, namely, remote and local technical administration of servers for others for the monitoring, administration, and management of public and private computer application systems; technical support services, namely, remote and on-site infrastructure management services for monitoring, administration, and management of public and private cloud computing information technology (IT) and application systems; research related to computer and data security; computer software development; computer software development and computer programming development for others; development of software for secure network operations; design and development of computer software; design and development of on-line computer software systems; computer software development in the field of personnel management systems; computer software development in the field of operational talent management systems; software development for others in the field of software configuration management; development, updating and maintenance of software and database system; design, development, and implementation of software for personnel data management and personnel utilization; computer programming services for electronic data security; design and development of computer software for the improvements of purchasing functions of business; developing computer software; developing customized software for others; development of customized software for others for use in risk assessment, information security, business analysis, audit and audit planning, and sales management; maintenance of computer software relating to computer security and prevention of computer risks; updating of computer software relating to computer security and prevention of computer risks; application service provider, namely, hosting, managing, developing, analyzing, and maintaining applications, software, and web sites, of others in the fields of employee productivity and risk management; Design, development, programming, installation, maintenance and updating of computer software relating to cyber security; developing recruiting and talent management non-downloadable software applications to automate and streamline career placement, employment recruiting, sourcing with regard to staffing, candidate screening processes, employment interviewing, employment hiring, on-boarding; developing non-downloadable automated software applications to define and market job opportunities, screening, evaluating, tracking, managing, interviewing, and assessing job candidates, hiring, tracking, and managing employees, consultants, and contractors throughout the lifecycle of the application process and their employment; Software-as-a-service (SAAS) services for employee management, namely onboarding, document management, performance reviews, offboarding, and time management; software as a service (SAAS) services, namely, hosting computer software for use by others for use in searching, monitoring, troubleshooting, and business analysis of customer data services; data security services, namely, maintenance of computer software relating to the prevention of computer risks; internet security services, namely, monitoring and resolving malware threats to software and IT systems; IT security, protection and restoration; professional consultancy relating to computer security; computer security threat analysis; Computer security against illegal network access; computer software design, namely, design of electronic data processing software; research in the field of transformative learning; cyber security services and consulting; cyber security assessment services; cyber security compliance and auditing; cyber security incident response and recovery; cyber security support.