Class 009: Downloadable computer software for AI/ML security and defense, including for large and small language models, vision models, audio models, and multi-modal models, and other machine learning models, algorithms, and agents; AI/ML red-teaming, including adversarial testing, prompt injection, data poisoning, and model inversion; blue team AI/ML model defenses, including adversarial robustness, input filtering, data noising, and model monitoring; AI/ML training, fine-tuning, RAG (Retrieval-Augmented Generation), inference, and neural rendering; AI/ML testing and evaluation, AI/ML model benchmarking and ratings; data science, cybersecurity, cloud security, network security, software testing and evaluation, security compliance management, threat intelligence, anomaly detection, threat hunting, intrusion detection and prevention, incident response, digital forensics, reverse engineering, penetration testing, red teaming, adversarial testing, threat modeling, vulnerability management, vulnerability scanning, vector databases, data privacy, encryption, and data loss prevention; Class 042: Software as a service (SAAS) for AI/ML security and defense, including for large and small language models, vision models, audio models, and multi-modal models, and other machine learning models, algorithms, and agents; AI/ML red-teaming, including adversarial testing, prompt injection, data poisoning, and model inversion; blue team AI/ML model defenses, including adversarial robustness, input filtering, data noising, and model monitoring; AI/ML training, fine-tuning, RAG (Retrieval-Augmented Generation), inference, and neural rendering; AI/ML testing and evaluation, AI/ML model benchmarking and ratings; data science, cybersecurity, cloud security, network security, software testing and evaluation, security compliance management, threat intelligence, anomaly detection, threat hunting, intrusion detection and prevention, incident response, digital forensics, reverse engineering, penetration testing, red teaming, adversarial testing, threat modeling, vulnerability management, vulnerability scanning, vector databases, data privacy, encryption, and data loss prevention
Downloadable computer graphics software; Downloadable computer software development tools; Downloadable computer programs using artificial intelligence (AI) for computer and machine vision.; Research and development of computer software; Design and development of computer software; Creating, maintaining, and modernizing computer software; Machine vision technology research; Research in the field of artificial intelligence (AI); Research in the field of artificial intelligence (AI) technology; Technical consulting in the field of artificial intelligence (AI) software customization; Technology consultation in the field of artificial intelligence (AI)
Downloadable software programs using artificial intelligence (AI)/machine learning (ML) for data science, security, and analytics; Providing on-line, non-downloadable software using artificial intelligence (AI)/machine learning (ML) for data science, security, and analytics
Downloadable software programs for generating data for artificial intelligence (AI) system development and testing; downloadable software programs for virtualizing and simulating sensors, systems, objects, substances and materials; downloadable software programs for performing computer rendering; Providing on-line, non-downloadable software for generating data for artificial intelligence (AI) system development and testing; providing on-line, non-downloadable software for virtualizing and simulating sensors, systems, objects, substances and materials; non-downloadable software for computer rendering; research and development of artificial intelligence and machine learning algorithms and models; design and development of computer software for others in the field of artificial intelligence and machine learning
Downloadable software programs for virtualizing and simulating physical systems, objects, substances, and materials to generate synthetic data for training artificial intelligence (AI) systems and evaluating the performance of such AI systems; downloadable software programs for virtualizing and simulating vision and imaging systems, and for virtualizing and simulating physical objects, substances and materials for virtual analysis by simulated vision and imaging systems, to generate synthetic data for training AI systems and evaluating the performance of such AI systems; downloadable software programs for virtualizing and simulating X-ray and Computed Tomography (CT) systems, and for virtualizing and simulating physical objects, substances and materials for virtual analysis by simulated X-ray and CT systems, to generate synthetic data for training AI systems and evaluating the performance of such AI systems; Providing on-line, non-downloadable software for virtualizing and simulating physical systems, objects, substances, and materials to generate synthetic data for training artificial intelligence (AI) systems and evaluating the performance of such AI systems; providing on-line, non-downloadable software for virtualizing and simulating vision and imaging systems, and for virtualizing and simulating physical objects, substances and materials for virtual analysis by simulated vision and imaging systems, to generate synthetic data for training AI systems and evaluating the performance of such AI systems; providing on-line, non-downloadable software for virtualizing and simulating X-ray and Computed Tomography (CT) systems, and for virtualizing and simulating physical objects, substances and materials for virtual analysis by simulated X-ray and CT systems, to generate synthetic data for training AI systems and evaluating the performance of such AI systems
Providing training in the fields of cybersecurity, compliance with industry standards in the field of cybersecurity, and the use of artificial intelligence in cybersecurity monitoring and risk analysis; Computer security consulting, advisory and computer security services in the nature of responding to cybersecurity threats namely, namely, restricting unauthorized access to computer networks, investigating, and analyzing cybersecurity incidents and data breaches, collecting, analyzing and monitoring technical, computer, and network data to identify potential cybersecurity events, risks, and improvements, analyzing cybersecurity data using artificial intelligence, deep learning, and machine learning software and algorithms, development and engineering of computer software systems to monitor, analyze and report on cybersecurity related events, performing computer security threat analysis for protecting data, penetration testing of computers and networks to assess information security vulnerability, and assessments of IT applications, systems, infrastructure, and computer networks to assess information security vulnerability, generating and providing reports related therefore for cybersecurity regulatory compliance with industry standards, analysis of cybersecurity performance, vulnerabilities, and risk
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.