Publication Registration: |
Wednesday, August 17, 2016 |
Goods and Services Information
|
Description:
|
(1) - Computer hardware; computer hardware, namely, computers, servers and storage devices, namely, high speed storage subsystems for storage and back up of electronic data either locally or via a telecommunication networks; computer software for use in controlling the operation and execution of computer systems, programs, and networks; computer software for implementing and managing network security; computer software for scanning, detecting, quarantining and eliminating of viruses, worms, Trojans, spyware, adware, malware and unauthorized data and programs on computers and electronic devices; computer operating system software; computer software for linking together computers and for enabling computing across a globally accessible network; computer software for use in developing computer programs, computer applications and computer software architecture; and manuals sold as a unit therewith
(2) - Business management consulting services; market research; data processing services; arranging and conducting trade show exhibitions in the field of computers, computer services, information technology and electronic business transactions via a global computer network; (b) Computer systems integration services; computer consultation services in the field of design, selection, implementation and use of computer hardware and software systems for others; technical support services, namely, troubleshooting of computers, servers and computer software problems; computer systems design services for others; computer systems analysis; computer software and hardware testing services, namely, testing of computer software, computers and servers; installation, updating and maintenance of computer software; computer programming for others. Computer security services, namely, enforcing, restricting and controlling access privileges of users of computing resources for cloud, mobile or network resources based on assigned credentials and restricting access to and by computer networks to and undesired web sites, media and individuals and facilities; computer information security consultancy, namely providing cloud-based scanning of computers and networks to search for information security vulnerabilities.
|