Class 042: Artificial intelligence as a service (AIAAS) services featuring software using artificial intelligence (AI) for providing a network of autonomous agents delivering reasoning, planning, analysis, synthesis, data collection, and optimization for scalable solutions
Information Technology consulting services, namely, technological consultation in the field of information technology platforms and systems; advice on designing, selecting, and using IT platforms in the nature of computer hardware and systems; platform support services, namely, trouble-shooting in the nature of diagnosing integrated computer hardware and software solutions problems; support services, namely, trouble-shooting software configuration problems; computer system architecture services for others; IT computer systems analysis; interconnecting computer systems, hardware and software, namely, system integration, networks and software configurations; testing computer software and hardware configurations, namely, testing operational functionality of software, desktops and servers; software installation, configuration, updating and maintenance; IT consulting in the field of information management and strategies, namely, program development and implementation, acquisition strategies and support, Information Technology Infrastructure Library ("ITIL"), enterprise solutions and business automation; providing consulting and support services in the area of cyber security, namely, Virtual Private Network ("VPN") configuration, optimization, and public key infrastructure ("PKI"), evaluation of intrusion detection and prevention risks and capabilities, software application security, firewalls, installation and configuration of intrusion detection and prevention systems, compliance with The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and The Health Information Technology for Economic and Clinical Health Act ("HITECH Act"); and performance of data and network security audits, namely, data breach threat analysis, database security analysis, firewall audits, penetration testing, advising in security architecture, assessment of risks from social engineering, web site security risks and wireless security risks; computer software consultation in the nature of program management and strategic consulting services in the field of Agile Program Management, software development, and Development Operations (DevOps); computer technology support services and advice on the implementation of computer hardware IT and IT systems that align with customer goals and objectives
Information technology consulting services, namely, technological consultation in the field of information technology platforms and systems; advice on designing, selecting, and using IT platforms in the nature of computer hardware and systems; platform support services, namely, trouble-shooting in the nature of diagnosing integrated computer hardware and software solutions problems; support services, namely, trouble-shooting software configuration problems; computer system architecture services being computer system design services for others; IT computer systems analysis; interconnecting computer systems, hardware and software, namely, system integration, networks and software configurations; testing computer software and hardware configurations, namely, testing operational functionality of software, desktops and servers; software installation, configuration, updating and maintenance; IT consulting in the field of information management and strategies, namely, program development and implementation, acquisition strategies and support, Information Technology Infrastructure Library ("ITIL"), enterprise solutions and business automation; providing consulting and support services in the area of cyber security, namely, Virtual Private Network ("VPN") configuration, optimization, and public key infrastructure ("PKI"), evaluation of intrusion detection and prevention risks and capabilities, software application security, firewalls, installation and configuration of intrusion detection and prevention systems, compliance with The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and The Health Information Technology for Economic and Clinical Health Act ("HITECH Act"); and performance of data and network security audits, namely, data breach threat analysis, database security analysis, firewall audits, penetration testing, advising in security architecture, assessment of risks from social engineering, web site security risks and wireless security risks; computer software consultation in the nature of program management and strategic consulting services in the field of Agile Program Management, software development, and Development Operations (DevOps); computer technology support services, namely, help desk services; and advice on the implementation of computer hardware IT and IT systems that align with customer goals and objectives
Platform as a service (PAAS) featuring computer software platforms for the creation, management and utilization of digital twins and digital threads; Software as a service (SAAS) services featuring software for the creation, management and utilization of digital twins and digital threads
Training in the field of using computer hardware; Advisory services in the field of troubleshooting in the nature of the repair of computer hardware; Information Technology consulting services, namely, technological consultation in the field of information technology platforms and systems; advice on designing and selecting computer hardware and systems suitable for their intended users, using IT platforms in the nature of troubleshooting in the nature of diagnosing computer hardware problems; platform support services, namely, trouble-shooting in the nature of diagnosing integrated computer hardware and software solutions problems; support services, namely, trouble-shooting software configuration problems; computer system design services for others; IT computer systems analysis; interconnecting computer systems, hardware and software, namely, integration of computer systems and networks and computer software programming in the field of software configuration management; testing computer software and hardware configurations, namely, testing operational functionality of software, desktops and servers; software installation, configuration, updating and maintenance; IT consulting in the field of information management and strategies, namely, consulting in the field of computer software program development and implementation for use in the planning of business acquisition strategies and computer software troubleshooting support, management of information technology infrastructure computer software library, designing enterprise solutions and business automation software; providing consulting and support services in the area of cyber security, namely, consulting in the troubleshooting of computer software for use in virtual private network configuration, optimization, public key infrastructure management, evaluation of intrusion detection and prevention risks and capabilities, management of software application security, firewalls, installation and configuration of intrusion detection and prevention systems, evaluating of compliance with The Health Insurance Portability and Accountability Act of 1996 and The Health Information Technology for Economic and Clinical Health Act, and evaluating the performance of data and network security audits, in the nature of, data breach threat analysis, database security analysis, firewall audits, penetration testing, advising in security architecture, assessment of risks from social engineering, web site security risks and wireless security risks; computer software consultation in the nature of program management and strategic consulting services in the field of agile program management, software development, and development operations; computer technology consulting services and advice on the implementation of computer hardware IT and IT systems that align with customer goals and objectives
Information Technology consulting services, namely, technological consultation in the field of information technology platforms and systems; advice on designing, selecting, and using IT platforms in the nature of computer hardware and systems; platform support services, namely, trouble-shooting in the nature of diagnosing integrated computer hardware and software solutions problems; support services, namely, trouble-shooting software configuration problems; computer system architecture services for others; IT computer systems analysis; interconnecting computer systems, hardware and software, namely, system integration, networks and software configurations; testing computer software and hardware configurations, namely, testing operational functionality of software, desktops and servers; software installation, configuration, updating and maintenance; IT consulting in the field of information management and strategies, namely, program development and implementation, acquisition strategies and support, Information Technology Infrastructure Library ("ITIL"), enterprise solutions and business automation; providing consulting and support services in the area of cyber security, namely, Virtual Private Network ("VPN") configuration, optimization, and public key infrastructure ("PKI"), evaluation of intrusion detection and prevention risks and capabilities, software application security, firewalls, installation and configuration of intrusion detection and prevention systems, compliance with The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and The Health Information Technology for Economic and Clinical Health Act ("HITECH Act"); and performance of data and network security audits, namely, data breach threat analysis, database security analysis, firewall audits, penetration testing, advising in security architecture, assessment of risks from social engineering, web site security risks and wireless security risks; computer software consultation in the nature of program management and strategic consulting services in the field of Agile Program Management, software development, and Development Operations (DevOps); computer technology support services and advice on the implementation of computer hardware IT and IT systems that align with customer goals and objectives
Platform as a service (PAAS) featuring computer software platforms for use in software development, application hosting, data engineering and cybersecurity monitoring
Platform as a service (PAAS) featuring computer software platforms for providing integrated data management across distributed data infrastructures; Platform as a service (PAAS) featuring computer software platforms for data management utilizing federation and automation to broaden data ingestion capabilities
Platform as a service (PAAS) featuring computer software platforms for efficient data analysis across engineering disciplines and applications through the integration of the model-based engineering platform
Downloadable computer software application for administrative tracking of employee health and location, employee symptom management, employee health screening, and workspace cleaning; Downloadable computer software application for providing information about medical testing, CDC health guidelines and quarantine measures
Facility and operation management services | Information technology training services | Information technology services, namely, software engineering; software development services for service oriented architecture and data visualization; development of Software for mobile applications; secure web software development; systems engineering and technical assistance (SETA), namely, remote administration and management of in-house and hosted datacenter devices, databases and software applications; cloud infrastructure and modernization services, namely, public and private cloud, hybrid cloud, security and identity, systems management, backup and disaster recovery; infrastructure engineering and automation Services; cybersecurity services; technology consulting services, namely, technology planning in the area of enterprise business applications; engineering services, namely, systems engineering and integration; design, development, testing, and evaluation of systems for use in outer space; management of scientific laboratories for others, namely, modelling, simulation and animation, systems, process, and physical logistics, and management and operations of scientific laboratories and facilities
Providing temporary use of on-line non-downloadable software and applications in support of Federal Government contracts, for use by Government employees and Government Contractor Employees, in collaboration and accessing data related to property management, security visit requests, leave and vacation requests, overtime requests, organizational email, employee profiles, institutional learning, timekeeping, help desk requests, travel requisitions, mission support activities, and other business productivity tasks
Computer consulting services; advice on designing, selecting, and using computer hardware and systems; technical support services, namely, trouble-shooting in the nature of diagnosing computer hardware and server problems; technical support services, namely, trouble-shooting computer software problems; computer system design services for others; computer systems analysis; interconnecting computer hardware and software, namely, integrating computer systems, networks and software; testing computer software and hardware, namely, testing operation and functionality of software, computers and servers; software installation, updating and maintenance; consulting in the field of information technology management and strategies, namely, program development and implementation, acquisition strategies and support, Information Technology Infrastructure Library ("ITIL"), enterprise solutions and business automation; providing consulting and support services in the area of cyber security, namely, Virtual Private Network ("VPN") installation, optimization and configuration, public key infrastructure ("PKI"), evaluation of intrusion detection and prevention risks and capabilities, software application security, firewalls, installation and configuration of intrusion detection and prevention systems, compliance with The Health Insurance Portability and Accountability Act of 1996 ("HIPAA") and The Health Information Technology for Economic and Clinical Health Act ("HITECH Act"); and performance of data and network security audits, namely, data breach threat analysis, database security analysis, firewall audits, penetration testing, advising in security architecture, assessment of risks from social engineering, web site security risks and wireless security risks
Cookie Preferences
We use cookies (including Google Analytics) to improve our site and understand how visitors use it.