35
Business consulting services in the field of cloud technology; Business Process as a Service (BPaaS) services, namely, business process outsourcing services, in the field of automation and standardization of business processes
39
Storage of electronic data
42
Computer infrastructure hosting services, namely, infrastructure as a service (IaaS), namely, providing computer hardware and computer software to others on a subscription or pay-per-use basis; IT consulting services; Technical consulting services in the fields of datacenter architecture, cloud technology, and evaluation and implementation of internet technology and services; Monitoring of computer systems and networks for purposes of tracking hardware and software resource availability; Platform as a service (PaaS) services featuring software for creating new software applications for use in cloud environments; Software as a service (SaaS) consulting services; Hosting of websites and software applications for others; Providing transparency monitoring as a service using online, non-downloadable software; Software conversion services, namely, converting pre-existing software applications for use in cloud environments; Cloud computing featuring software for moving virtual machines from customer premise to off premise infrastructure as a service; Computer software design as a service; Computer application development services; Implementation and updating of software as a service; Integration of computer systems and networks; Computer software testing as a service; Computer file and data protection services, namely, replication, failover, failure recovery and disaster recovery for others; Managed computer services, namely, managed firewalls, managed backups, and security scans in the nature of computer virus protection services; Data backup and data restoration service; Computer services, namely, remote management of computer operating systems, databases, and software applications
45
Monitoring of computer systems and networks for security purposes; Consulting in the field of Internet, network, and computer system security