42 Web-architected software, namely, providing on-line non-downloadable software which improves business process automation for cloud communication, payment card industry (PCI) compliance, inventory management, warehouse management, hardware service maintenance and tracking, mail tracking and cargo handling, point-of-sale (POS), bar code and radio frequency identification (RFID), mobile computing, automated data collection, wireless networking, and data security; servicing of software and web-architected software, namely, installation, maintenance, updating and repair of computer software; technical support services, namely, troubleshooting in the nature of diagnosing computer hardware and software problems; technical support services, namely, troubleshooting of computer software problems; providing temporary use of non-downloadable cloud-based software for connecting, operating, and managing networked devices and hardware in the internet of things (IoT); technology consultation in the field of cybersecurity; cybersecurity services in the nature of restricting unauthorized access to computer systems; computer programming consultancy in the field of cybersecurity; computer services, namely, remote and on-site management of computer firewalls and computer gateways for retailers; rental of computer firewall systems consisting of computer hardware and operating software; maintenance of computer firewall software systems; providing automatic firewall software updates; computer services, namely, providing custom configuration of firewalls and gateways for retail customer computer systems; Computer system testing and analysis services relating to the identification and elimination of computer system and computer network security vulnerabilities which facilitate access and attack of the system or network by unauthorized individuals; development, updating, and maintenance of computer network security software for managing computer network endpoint security and for predicting and monitoring security threats to computer networks; Monitoring of computer systems for detecting unauthorized access or data breach, particularly, logging and tracking access and entry