42 Leasing of software for secure, cloud-based file storage, transfer, and sharing; Providing temporary use of on-line non-downloadable software for use in software asset management; Electronic data storage; Cloud computing featuring non-downloadable computer software for use in software asset management; Software asset management, namely, providing non-downloadable software for the discovery of SAAS application usage, monitoring, reporting and optimization; Providing temporary use of on-line non-downloadable software for use in managing subscriptions to SAAS applications, including entitlement to use by user and utilization as well as calendaring subscription expiration, renewal and calendar events; Software as a service (SAAS) services featuring software for software asset management for use in discovery of third party software as a service (SAAS) usage, monitoring, and reporting of imported contracts, costs, entitlement and fulfillment of software licenses tooptimize subscription costs, rationalize application inventory and vendor contracts, and mitigate risk from unlicensed or unsanctioned applications; Software as a service (SAAS) services featuring software for use in software asset management in the field hybrid cloud management for business oversight and efficiency for empowering process transformation; Software as a service (SAAS) services featuring software for use in software asset management in the field of automating software processes for control of use of hardware, software and cloud resources; Computer services, namely, creating an on-line community for registered users to participate in discussions, get feedback from their peers and experts, obtain product information and solution implementation advice related to software asset management; Asset management services, namely, management of SAAS software application usage, monitoring and reporting of imported contracts, costs, entitlement and fulfillment of licenses to optimize subscription costs, rationalize application inventory and vendor contracts, and mitigate risk from unlicensed or unsanctioned applications