Goods and Services | Information technology consulting services that are customized for each client; Computer monitoring services for proper functioning, detecting breakdowns, unauthorized access and data breach; Computer network monitoring services for proper functioning, detecting breakdowns, unauthorized access and data breach; Technical support services, namely, monitoring technological functions of computer network systems; Computer hardware and computer software maintenance services; Computer rental services; Software rental services; Computer software services; Application service provider (ASP), namely, hosting computer software applications of others; Software as a service (SAAS) services, namely, hosting infrastructure software; Remote computer network technical monitoring namely, monitoring technological functions of computer network systems and remote software maintenance services; Consulting services in the field of computer-based information systems for businesses; Consulting in the field of telecommunications technology; Consulting services in the field of identification, support, and implementation of computer-based information systems for businesses; Computer consultation in the field of computer security in the field of secured laptop, email protection, email archiving, web filtering, computer firewall, computer virus scanning software, wireless information security and vulnerability analysis; Consulting in the field of information technology; Design and development of networks namely wireless computer networks for others; Integration of computer systems and networks; Computer services, namely, remote and on-site management of the information technology systems of others; Information technology monitoring updates for computers, programs and software for businesses; Voice over internet protocol (VOIP) services; Computer disaster recovery services; Cloud based information technology services, namely, providing use of a non-downloadable cloud-based software for monitoring data and computer-based information systems for businesses; Information security and compliance solution services for small and medium businesses, namely, secured laptop, email protection, email archiving, web filtering, computer firewall, computer virus scanning software, wireless information security and vulnerability analysis; Consulting in the field of information technology for healthcare providers |