Welcome to MCE123, an Information Technology Marketing Firm, operating in New Hampshire's Seacoast near Barrington.
We provide contract Information Technology services, including computer network installation and services, computer repair, custom software development, on-site technical services, server administration, server management, website development, and website hosting.
We design and produce brochures, business cards, coupons, CPU badges, embroidered shirts, flyers, invoices, letterhead, logos, newsletters, newspaper advertisements, order forms, postcards, posters, price tags, presentation booklets, product labels, recipe books, research surveys, retail supplies, restaurant menus, screen printing, signs, and websites.
We accept Cash, Credit Cards, PayPal, Money Orders, and Check.
We have an internal Research & Development firm, MCE123 Technology Development, that focuses mostly on inventing technologies for security purposes, including for the domestic military and law enforcement communities. The current phase of the department’s work is developing concepts, and developing engineering documentation based on those concepts. Eventually, we will seek private and public funds to obtain patents for the technologies, and mass produce and/or sell the rights to the Intellectual Property on a per license basis.
Please note that we also offer services to develop custom invention concepts for private firms, government agencies, and other organizations on an as-needed basis.
Most of our work is Classified, however some of our non-Classified public works are available as examples on this website.
Our mission is to provide unique products and services in our fields of expertise, including cross-marketing, including in the intellectual defense of the United States of America.
We see our company evolving through our development of unique Intellectual Property, into products and services that are known by everyone, on Earth and beyond, for a period of no less than 500 years.
Our work goes anywhere there is someone in distress, someone in need of help, or something to challenge intellectually, as a function of improving the Quality of Life of our stakeholders, and accomplishing specific goals as far as recognition for our works, most of which are not public.
We create specific Intellectual Property, from processes that are not made public, such as creating virtual hostile environments – not to torment or plot against others – but to open our imagination to solving problems that have not been fully realized, through processes of securitization and simulation.
We study the market for weaknesses, and take advantage by creating products and services that help others accomplish their goals. We have a prolonged period of metaphors and metaphysics relating to our works, so that when they do become public, they are fully realized – rather than breaking news. We take advantage of our reputation with the Media, in every way we wish – as we design the image of the company and its stakeholders, as information transcends from extended periods of non-verification and unknown attributes, for discovering what others think and feel about our intelligence.
We ultimately define, on a very granular level, everything having to do with our market, for having complete control over the circumstances of our works.
We do believe, that as time goes on, our image will change from being granularly defined, to becoming interdependent upon stakeholders, and that the actual release of our products and services will become more than we can fully realize.
Key Concepts of Technology Development
Our company is in charge of a ‘virtual battlefield’ of Research & Development, that consists of multiple dimensions of theory, through the development of specific inventions, including unique products and services that aide in the understanding of how to control assets in the field, how to more accurately gather intelligence about emerging and major conflict zones, and how to challenge existing leadership structures and personnel with intensely debated intelligence, that ultimately leads to our success in furthering our understanding of what we have created, and how it can be used for peaceful purposes.
We follow this process through fabrication of intelligence that is counter to reality, but not counter to logic or discovery of new inventions. We protect this information from the public, while monitoring how leaks occur when they do, and we manipulate how the information is disseminated, by creating specific intelligence that mitigates the circumstances, while helping others to achieve their goals – which ultimately helps us with our Research & Development.