85462775
Nov 2, 2011
Customer service and support in the nature of providing assistance to customers who have a business issue or concern in the field of secure cloud computing, namely, cloud hosting in the nature of scalable hosting of computer software, Internet websites, Internet web software applications, electronic databases, digital content and business computer software applications which are accessible via the Internet
Advertising and BusinessPublic, Private and Hybrid cloud computing and customization services for designing, developing, adapting and configuring specific and unique secure cloud computing solutions and services, namely, cloud hosting in the nature of scalable hosting of computer software, Internet websites, Internet web software applications, electronic databases, digital content and business computer software applications of others that are accessible via the Internet. Technical support services, troubleshooting of computer software and network problems and diagnosing of computer hardware/software/security problems in the field of cloud computing services, Infrastructure as a Service (IaaS). Installation, configuration and operation of computer software platforms for creating, managing and deploying secure cloud computing infrastructure services and Software as a Service (SaaS). Research, design and optimization of computer hardware and software to run computer software platforms for creating, managing and deploying secure cloud computing infrastructure services. Design, deployment, support, management and maintenance of secure cloud computing infrastructure software, Software as a Service (SaaS), including but not limited to accounting, collaboration, customer relationship management (CRM), enterprise resource planning (ERP), invoicing, human resource management (HRM), content management (CM) and service desk management. Security as a service (SaaS) featuring Managed Security Services (MSS) for cloud computing, including round-the-clock monitoring, analysis and management of intrusion detection systems and firewalls, overseeing patch management and upgrades, performing security assessments and security audits, implementing security measures and responding to emergencies
Computer and Scientific