Class 009: Downloadable software for protecting the authenticity of an author’s notes, media, documents, or other content, proving an actor executed a particular action, and proving that said content or action was not altered by any third party; Downloadable software for providing digital signing, verification, and encryption; Downloadable software for inventory management, database management, data processing, financial management, trade execution, medical record keeping, contract execution, and voting; Downloadable computer application software for mobile phones, namely, software for enabling the secure management, sharing, encryption, authentication, and guarantee of integrity of personal and business data including notes, documents, and media in the nature of text, pictures, audio, and video; Downloadable computer software for tablets for enabling the secure management, sharing, encryption, authentication, and guarantee of integrity of personal and business data including notes, documents, and media in the nature of text, pictures, audio, and video; Downloadable computer software for enabling the secure management, sharing, encryption, authentication, and guarantee of integrity of personal and business data including notes, documents, and media in the nature of text, pictures, audio, and video; Recorded computer software for enabling the secure management, sharing, encryption, authentication, and guarantee of integrity of personal and business data including notes, documents, and media in the nature of text, pictures, audio, and video
Downloadable software for the organization and management of business and personal information; downloadable software applications for the organization and management of business, personal and sensitive information, namely notes applications with and without attachments such as picture attachments, video attachments, audio attachments, and files attachments, todo list applications, and project management applications; downloadable software applications for securely sharing, protecting, authenticating, and verification of integrity of personal and business information in the form of note application software, to-do list application software, and project management application software
Downloadable software for the organization and management of business and personal information; downloadable software applications for the organization and management of business, personal and sensitive information, namely notes applications with and without attachments such as picture attachments, video attachments, audio attachments, and files attachments, to-do list applications, and project management applications; downloadable software applications for securely sharing, protecting, authenticating, and verification of integrity of personal and business information in the form of note application software, to-do list application software, and project management application software
Business software, namely, downloadable software frameworks and software components that provide underlying functionality for application specific software written by a third party, the underlying functionality enabling scalability within and across multiple servers by enabling said third party software to handle multiple connections and multiple requests from those connections concurrently, providing Internet, intranet, and cloud connectivity and communications between modules of the application specific software running on the server and application specific code running on workstations or within browsers, and providing security to this connectivity capability, the application specific software being in the nature of software for inventory management, database management, data processing, website hosting and creation, graphical user interfaces, financial management, financial record keeping, accounting, medical record keeping, contract execution, document execution, voting, stock trading, auditing, transaction processing, and insurance claims management; downloadable business software for maintenance, manipulation and data mining of large quantities of data, namely caching software capable of supporting extremely rapid data retrieval and for searching and retrieving data from a large quantity of raw data and for providing a database or component of a database for managing, retrieving and altering large amounts of data; downloadable business and retail software applications for mobile phones and personal computers, namely, software applications that enable the secure management, sharing, encryption and authentication of personal and business data including notes, documents and media in the nature of text, pictures, audio and video.
Business software, namely, downloadable software frameworks and software components that provide underlying functionality for application specific software written by a third party, the underlying functionality enabling scalability within and across multiple servers by enabling said third party software to handle multiple connections and multiple requests from those connections concurrently, providing Internet, intranet, and cloud connectivity and communications between modules of the application specific software running on the server and application specific code running on workstations or within browsers, and providing security to this connectivity capability, the application specific software being in the nature of software for inventory management, database management, data processing, website hosting and creation, graphical user interfaces, financial management, financial record keeping, accounting, medical record keeping, contract execution, document execution, voting, stock trading, auditing, transaction processing, and insurance claims management; downloadable business software for maintenance, manipulation and data mining of large quantities of data, namely caching software capable of supporting extremely rapid data retrieval and for searching and retrieving data from a large quantity of raw data and for providing a database or component of a database for managing, retrieving and altering large amounts of data; downloadable business and retail software applications for mobile phones and personal computers, namely, software applications that enable the secure management, sharing, encryption and authentication of personal and business data including notes, documents and media in the nature of text, pictures, audio and video.
Computer software consulting; software development consulting in the field of finance, server-side software design and development, security, scalability, multi-thread and parallel processing, performance, communication, messaging, database interaction, database design, database connection pooling, database transaction processing, and financial transaction processing
Computer software consulting; software development consulting in the field of finance, server-side software design and development, security, scalability, multi-thread and parallel processing, performance, communication, messaging, database interaction, database design, database connection pooling, database transaction processing, and financial transaction processing
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.