Slide background
Slide background
Slide background

Infrastructure Management

Infrastructure Management is the core and the most important part of the technology subset of a company and where I invest most of my resources to achieve near-perpetual uptime on all fronts. My SLA is 99.999%.

Information Security

My business is information. My job is to protect it. I do it by using military-grade technology on every server, database, workstation, appliance and system that I manage. Encryption is my norm, on everything.

Help Desk & Support

Help Desk & Support is one of my core services because businesses rely on people and people rely on their IT equipment to work. My reply and turnaround times enable teams to work uninterruptedly.

Cloud Computing

Cloud Computing allows companies to move part of their infrastructure to datacenters. The way I do it is by setting up a tight-knit and fully encrypted integration between my clients’ offices and their datacenters.


I am a New York City-based corporate-focused Information Technology and Telecommunications professional. My goal is to be your company’s one-stop IT and Telecom service provider. I am knowledgeable in servers, firewalls, switches, workstations, wired and wireless networks, storage, security, disaster planning, software, databases, backups, data archiving and retention. I work with the major vendors: Apple, Cisco, Sonicwall, WatchGuard, Meraki, Aruba, Microsoft and everyone else out there that delivers technology solutions for small and medium-sized businesses. In the telecom field, I work with most of the brands: Shoretel, FortiVoice, Avaya, 3CX, Asterisk, Polycom and VoIP providers.

To do this properly, I only service a select group of companies and carefully choose my clients, to make sure that their business modus operandi and mine are a perfect match. This allows me to deliver tailored service to each account, to reply to each and every request in under 15 minutes and most importantly, to keep my clients’ technology infrastructures in perfect shape and secure at all times.

I focus my undivided attention on being fast to reply to clients and I believe that I am as thorough as it gets in everything I put my hands on. This is my mantra. I can’t emphasize enough how backups and encryption are important. I am relentless in implementing them and making sure that networks are secure. I invest as much time as I can in learning new technologies, in testing new security protocols and in understanding how to make my clients’ networks more efficient every day. All of this equates to my belief that when a customer outsources their IT management to me, they are in fact outsourcing their information management. And what is more important to a company than its information?

My clients are companies whose headquarters are primarily in New York City. They usually have between ten and one hundred employees spread throughout one or more offices. I work with accounting firms, law offices, public relations  and communication businesses, trading companies, apparel industries, retail operations, assorted manufacturers, marketing agencies, digital media companies, among a few others. The way I see it, I have learned the base of technology and telecommunications operations and I am capable of adapting to each and every client that retain my services.  However, for each one, I propose a different set of solutions –because each client is unique– but they all share the same principles: the technology has to be reliable, it has to be secure and it has to be prepared for disaster recovery. My typical client understands this and outsources their entire infrastructure management, information security and help desk services to me.

Infrastructure Management deals with the core technology of a company. It comprises of firewalls, switches, servers, PBX systems, structured cabling, wireless-access points and everything else that works behind the scenes to make information available. Information Security, on the other hand, is what makes sure that the information is always available but only to those with clearance and that data is safe throughout multiple locations. It’s also the art and science of preparing for disasters. Help Desk & Support is the last piece of the puzzle and focuses on making sure that companies’ personnel are always ready to work and that their technology is always up to speed.

My work is done ninety percent of the time in New York City. It’s where most of my resources are located and where I focus most of my attention. My clients, however, do have offices and sites in other cities, states and countries. I service them all and for them I use a custom-developed in-house state-of-the-art and fully encrypted remote-support technology that allows me to take care of most tickets myself, and when needed I do collaborate with local IT firms that assist me with tickets that require onsite presence. However, at all times, when third-party contractors are used, I keep sensitive information always secure and never disclose user names, passwords nor any other details that could otherwise compromise my clients’ security.

My response time is fifteen minutes. I will reply to all emails and phone calls within this timeframe. Give it a try. Send me a question: or 212.729.7122.


Infrastructure Management

My Infrastructure Management services are designed to guarantee that your company’s data and voice networks are up all the time, without interruptions. To achieve this I employe my near-perpetual uptime SLA.

My Infrastructure Management services are designed to guarantee that your company’s data and voice networks are up all the time, without interruptions, nor delays. To achieve this, I employee my near-perpetual uptime guarantee to every infrastructure-related hardware and software. In short terms, this means that I will add failovers and redundancies to every mission-critical appliance and I will continously test them, by recreating the exact same disaster scenarios that we are preparing for.

The equipment that are labelled as “mission-critical” varies from company to company and from industry to industry. For most companies, their Internet connection is an example of a vital service that must never be offline. To achieve near-perpetual uptime for Internet I employ: high-availability firewalls, which are each connected to a different power source and a different uninterruptible-power supply, and dual Internet connections, being delivered through different mediums.  The firewalls are then set up to continously probe one another and the secondary unit will automatically take over should it notice any inconsistencies with the main appliance. Both firewalls are directly connected to the independent Internet connections so if either data circuit goes offline, the firewalls automatically redirect traffic to the other. By having the firewalls, connected to separate UPS units, no power outage, nor a faulty UPS, will immediately impact Internet access.

With my near-perpetual uptime implementation, should the worse happen and one of the applications become unavailable, in spite of all the redundancies, the ticket becomes immediately top-priority and I will stop whatever I’m doing to employ all my resources in the quickest possible resolution. Hurricane Sandy was an event that although I prepared for, caused outages to networks because power went out for longer than the UPS batteries lasted for. Entire networks had to be rellocated because in some locations power took over 3 months to be restored. However, the rarity of this event, makes it unlikely that it will happen again but, nevertheless, some of my accounts have chosen to implement redudancy using locations outside of the 25-mile security perimeter. This allows them to remain operational even in face of disaster.

Every mission-critical hardware or software must not only be set up with redundancy but it must also be set up with continously logging. The logs are important so that I get notified whenever anything is detected, and for troubleshooting when needed. Logs can be set up to be delivered in a wide-array of ways, including text messages, emails and instant messages. For every technology there is a different logging solution. Logging is as important as setting up the redundancies.

Having all the backups, redundancies and logging in place is not enough. Testing them is as important as having them in place. A properly managed network, will not have its redundancies and failovers tested on the day that the unexpected strikes but will rather be continously tested, every 1 or 2 months. The tests comprise in recreating the scenario that the network was built to endure. These range from Internet outages to full-blown electrical failures. In the first case, the main Internet can be unplugged from the firewall and in the second the backup UPS powered off. In both cases, the important aspects are to time how long it took for the network to be fully restored, whether logs were properly sent via email and if the lead technician for that network received and replied to them in a timely manner. In addition to testing, a document with protocol and procedures is also indicated for company managers to distribute to key personnel, so they know who to call and how to react when any issues are detected.

Shall we schedule a free site survey for me to inspect your network and propose solutions to improve its resiliency?

Information Security

My job is to protect information. I use military-grade technology to achieve it. My strategy is to apply to everything I do the three principles of Information Security: integrity, availability and confidentiality.

My business is information. My job is to protect it. I use military-grade technology to achieve it. My strategy is to apply to everything I do the three principles of Information Security: integrity, availability and confidentiality. Integrity of data is achieved through backups and versioning. Availability requires hardware redundancy and planning. Confidentiality combines hardware and software technologies to encrypt data storage and transmission.

Availability, the first part of the equation, is achieved by using thoroughly tested hardware and software, and by applying my Near-Perpetual Uptime® technology throughout the entire IT infrastructure. This guarantees that data will always be available, no matter what. Within mission-critical environments, for example, high-availability firewalls and servers can be set up, using independent power sources and network switches, allowing anyone of them to be powered off without impacting the workflow of the company. The rule, for this variable, is that information must be available whenever it is needed.

Integrity of information, on the other hand, can only be achieved when data is continously backed up, versioned and checked. From my experience, it is very common for a company to have a backup routine in place but wihout testing the backup destinations, causing an uncertainity of whether or not the backups are effective. It’s also common for a single backup destination, within the same site, to be the only backup routine, creating an unreliable integrity scenario. And lastly, versioning will guarantee that even if a damaged/corrupted file gets backed up to all the backup destinations, a previous version will always be available for restore. Combining this three tactics creates a reliable Information Security integrity strategy.

Confidentiality is the core of my Information Security services. Its goal is to make sure that data will only be available to those authorized to access it. My tactics to get this done include encryption, data and log monitoring, and strict company policies, all of which are constantly reviewed and updated. It would be very simple to unplug the data server and store it inside a vault, without Internet access, fully fire and water proof. However, this would also mean that, data availability, described above, would be out of context as the information would not be readily available. Therefore, the goal is to protect information as much as possible, without restraining access to those who are authorized. Hardware and software solutions are available. They include tokens, SSL certificates and biometrics.

In addition to making sure that the servers that I manage are secure, I also offer independent Information Security audit and consulting services for companies that wish to have their infrastructure checked and/or monitored by my Information Security services. These reports and monitoring usually vary in scope, depending on what the company has in place IT-wise. The most common audits and consulting are for: websites, databases, email and file servers, virtual-private networks, mobile devices and corporate authentication.

Help Desk & Support

Help Desk & Support is one of my core services. It walks side by side with my other services because it’s the last link between technology and employees. Help Desk tickets have our 15-minute response-time promise.

Help Desk & Support is one of my core services. I tightly integrate it to my Infrastructure Management and Information Security strategies, as users’ devices and applications need to be as secure as the infrastructure and thus the increased challenge, as workstations tend to be the weak link in corporate networks.

To efficiently provide Help Desk & Support I understand that tickets must be replied to within 15 minutes so that the person in need of assistance is aware how long it will take for the ticket to be resolved. To achieve this, I rely on different tools but the most important two are: fast communication and well trained back-end Help Desk technicians, aside from my state-of-the-art ticketing technology.

Structured Cabling

Structured cabling plays a vital role in the infrastructure of a company. It is the medium through which data and voice are transmitted from workstations to the IT room.

Structured cabling plays a vital role in the infrastructure of a company. It is the medium through which data and voice are transmitted from workstations to the IT room. The challenges in getting it done right vary depending on the location, the average distance between the workstations and the IT room, whether or not there is magnetic interference that should be accounted for, the type of floor and ceiling through where the cables will be run, among others.

The labor cost to run cables is directly related to the aforementioned variables but in general ranges from $60 to $120. While the hardware cost will vary depending on the materials chosen. In general, category-6 or fibre-optic cabling is recommended for backbones while category-5e can be used for workstations, data and phones. However, some companies are choosing to run cat-6 throughout the premises to be prepared for the faster 10-gigabit networks, which should be the norm in the next 5 to 8 years.

As fiber becomes more popular, more servers and workstations will be ready for it and while copper cables transmission speeds can only be increased by improving shielding or reducing the average cable length, fibre-optic cabling offsets the limitation to the hardware as the speed of light is its single variable. There are hardware that can use a single pair for for multiple and independent links, each running at 10 gigabits per second, by employing different spectrum-color to each link. Fiber-to-the-office is also a reality and this will empower companies to move even further to a hybrid of cloud and onsite technology.

As in any infrastructure project, the initial planning is the most important phase, along with having allocated the appropriate budget to invest in high-end material.

Cloud Computing

Cloud computing is becoming the norm in corporate  technology as companies find more ways to outsource their infrastructure to datacenters and by doing this they not only gain in costs but also in flexibility.

Cloud computing is becoming the norm in corporate  technology as companies find more ways to outsource their infrastructure to datacenters and by doing this they not only gain in costs but also in flexibility. The challenge of getting this done properly is not in the act of moving to the cloud but making its integration with the onsite and already installed infrastructure secure, reliable and resilient.

The cloud should be treated exactly as onsite technology is, with backups, with encryption, with 24/7 monitoring but with the benefit of not having to physically own nor maintain the hardware, as this is outsourced to datacenters which allows a company to save in space, in  electric bills, in insurance and all the other variables that sum up to total cost of ownership.

For the cloud to work in corporate  environments a secure and dedicate Internet link must be established between all offices and datacenters; backups must be set up to locations outside of the datacenter, with versioning and retention policies; business continuity must be planned and tested; and, data must be encrypted. All of this, as with in-house technologies, creates a reliable cloud infrastructure for companies, that reduces ownership costs and increases overall reliability. That’s the beauty of the cloud, doing more with less and getting it all done faster.


Virtualization is now the norm for businesses as it splits physical servers into multiple, independent vServers, increasing efficiency and reducing total cost of ownership. vServers are the future of computing.

Virtual machines are now the norm for businesses. In the past, multiple servers were purchased, one for each task, creating not only an excessive cost for the initial purchases but also generated high maintenance costs in electricity, air conditioning, IT room space, among others. With the introduction of the virtualization technology, a single server can be sliced up into smaller virtual machines. This allows each server to be used up efficiently, while still dividing all the tasks onto different virtual computers, creating a reliable infrastructure of server.

Ideally, each company should have at least two independent servers, which can be filled up with as many different virtual servers as are needed. This allows one of the servers to be completely powered off, while all the tasks are transferred to the working one. This ideal scenario allows the maintenance and troubleshooting without bringing the entire network to a halt.

Conrad has specialized in private virtualization and has delivered thousands of virtual servers, to hundreds of clients in New York City. The most recent project involved the setting up of a redundant server with mirroring on two different sites, one in the USA and the other in France, where the client’s factory is located. This mirroring allowed both sites to work simultaneously without any noticeable delays in the data transmission over their Intranet which is connected using their virtual-private network.

With virtualization, Apple OS X,  Microsoft Windows and Linux operating systems can now safely work within the same physical server. While in the past companies needed separate servers, or even separate networks, for Apple, Microsoft and Linux. With the virtual technology, they can now efficiently coexist.

One of the important aspects of any corporate project is the expected return over investment. For virtualization, the mathematics are usually simple and the project pays itself off within months of implementation. If needed, I can share additional success business cases, with ROI analysis.

Business Continuity

Business continuity is how I prepare my clients’ infrastructures for the worst. I do it by preparing the different disaster scenarios and then testing the entire technology infrastructure for them.

Business continuity is how I prepare my clients’ infrastructures for the worst. I do it by preparing the different disaster scenarios and then testing the servers, firewalls, databases, datacenters and everything else that is part of the technology subset, for them. This continuous planning and testing service allows us to tweak everything and be ready if it’s ever needed.

The most important aspect of this service is presenting my clients with the different scenarios and the different business continuity options for each one. Mission-critical infrastructure –such as Internet connectivity, email and phones– require high-availability setups, where there can be no downtime, while other less critical applications –such as video conferencing or printing– can have a few hours to even a few days for repairs and maintenance.

To achieve no downtime in the mission-critical hardware and software, solutions with redundancy and replication of data are created across as many sites as needed. An email service, for example, should be set up with servers on at least two datacenters that are continuously mirrored to one another, allowing anyone of the two to go offline, with virtually no visible downtime for the people using it for their communications.


There are hundreds of different telecom brands available. The challenging part is no longer finding one that suits your needs but choosing between all the ones that do. My job is to help you choose.

There are hundreds of different telecom options available for companies. The challenging part is no longer finding one that suits the needs but choosing between all the ones that do. The race between the brands is so intense that most of them work exactly in the same way, offering the same features, the same options and even more, allowing one brand of phones to work with another PBX brand. My specialty is finding the one that will suit your company’s need best, for the lowest price.

Security is a priority in everything that I do and with telecom it’s no different. Securing a PBX system is similar to securing a server: it must be locked inside a datacenter, it must be protected from Internet access, users should have restricted access to resources, passwords must match corporate policies, data tranmission must be encrypted, data storage must be compliant to industry standards.

In the last 5 years, most small and medium-sized businesses have migrated from analog telecom hardware to digital solutions. This new era of telecommunications makes it simpler for remote employees, or for those that work away from the office part time, to have access to the same features and voice quality as the full-time onsite employees. Today’s phone systems allows, for example, an employee to set up a home office with a conference phone, a cordless phone and a desk phone, all sharing the same 3-digit extension that they’d have if they were working from the office headquarters. For employees who are frequently on the move, an iOS or Android app allows full integration over 3G/4G/LTE Internet connections.

Voice over IP, or simply VoIP, is how land lines get transferred to the cloud. Instead of having the traditional phone company go to a company’s office and connect land lines, we outsource this entirely to VoIP providers, who deliver the VoIP channels over the Internet and we let them deal with the phone providers. These VoIP channels then integrate to the in-house phone systems. As with everything Internet-related, it is important to have redundancy in place, to make sure that if any of the Internet circuits go offline, the phone systems remain fully operational. VoIP technolgy is now fully tested and quality is guaranteed. In the past, echo on the calls was a problem but the modern phone vendors have, through complex algorithms, solved this to the point where VoIP calls now sound better than land lines.

I do support traditional phone systems as well, including Shoretel, Avaya, Panasonic, Nec and any other analog hardware, along with hybrid environments that allow companies to move to a more modern phone system, without needing to replace the hardware that has already been purchased. Call me for an onsite visit for me to evaluate and propose solutions for your corporate telecom needs.

Audio & Video

The fine line that used to separate corporate technology from audio and video is getting narrower. With media companies resorting to digital storage, servers are now being used for audio and video streaming and storage.

The fine line that used to separate corporate technology from audio and video is getting narrower. With many media companies resorting to digital storage, servers –that were once set up for office-suite file sharing– are now being set up and used for audio and video streaming and storage. While the technology is similar, media files are usually much larger and require a different approach in order to deliver efficiency and reliability.

I have developed solutions for numerous entertainment companies. The most recent project was the setting up of a 400-terabyte storage datacenter, including onsite and offsite backup routines for the entire data set. As with any project that involves data, the backup is the main challenge. In this case, it was even more so because of the sheer time ithat t takes to copy 400 terabytes. At a regular gigabit link –today’s corporate norm– it would take nearly 40 days. Therefore, the solution was to set up 10-gigabit fiber-optic circuits, to reduce the initial backup from 40 to 3.8 days, and use incremental routines, with rotating disks, to speed up subsequent backups.

Data deduplication can also be adopted to create versioning and backups without having to increase storage capacity. However, with data deduplication the risk of data corruption is increased and more than one backup routine is a must to improve data security and integrity.

In addition to go all-digital on the storage front, Ethernet and fiber-optic cabling are now being used for realtime video and audio transmission. The main benefit is the reduced number of cables needed because while analog transmissions require a separate cable for each channel, digital connections can group multiple channels onto the same link. My structured cabling service also encompasses media streaming and storage.

All in all, companies that have massive storage needs can benefit from going digital by increasing their data security, while speeding up processes. And investing in the correct combination of technologies can drastically reduce costs, increase ROI and simplify data management. My job is to help you in this decision process and catapult your data-intensive business ahead of its competition.

The technology is here, it’s fast and it’s cool.


    Abruzzo Bodziak Architects

    Responsible for their entire network infrastructure, including help desk support. Recently implemented a VMware ESXi server on an existing HP server. Multiple virtual machines were deployed for user authentication, encrypted DNS, and software licensing. Linux-based file sharing server was set up and integrated to authentication vServers.

    Armchair Studio

    One of my first clients in New York. I manage their Infrastructure Management, Information Security and Help Desk & Support tickets. A recent project was the implementation of an SSL VPN appliance to allow encrypted remote access to data using HIPAA-compliant hardware and software. All data transmition to and from servers and the Internet is permanently logged to an onsite server.

    Cityscape Abstract

    Deployed Cityscape Abstract's technology infrastructure from ground up. Involved with the entire decision and purchase process for hardware and software. Multiple vServers using VMware ESXi were set up creating an efficient and secure network environment. Dedicated servers were set up to allow fast remote access to the data. Encrypted data transmission with SSL/TLS.

    Dian Griesel, Inc.

    A complex network operation as it involves multiple sites spread throughout the USA. Everything is managed from New York City. All sites are integrated and from any of them there is access to all the data and phone system. A recent project was the move to a new office space in Manhattan and I was responsible for the entire data and voice infrastructure, including cabling.

    Holly Hunt

    Holly Hunt Enterprises, Inc. manages most of their data and voice networks with their in-house IT team. We were hired to set up the video, data and voice Ethernet structured cabling for one of their international offices, in Sao Paulo. Their alarm system is also managed by us alongside the invoicing software and printing technology. We also support their offices in New York City.

    Jones New York Intimates

    I manage Jones New York Intimate's entire data and voice infrastructure, which is spread across 10 different locations, including international sites. Our services to them also include Information Security and Help Desk & Support. In total, we manage over 25 servers, and over 100 workstations and employees.

    JUARA Skincare

    JUARA Skincare's network infrastructure is spread across multiple locations, including a few international brances. We manage their New York site, which includes their accounting server, their email server, their firewall and wireless infrastructure. Backups are present on all fronts. Everything uses encrypted data transmission. We also provide Help Desk & Support services.

    Live In Five Media Relations

    Fast communication is the priority for Live In Five Media Relations. For them, I developed a custom in-house email solution, with email servers on two separate datacenters that are sync'ed to one another in real time. I also manage their entire web presence, which includes multiple web and database servers.

    Skillman Law

    I provide all my main services to Josh Skillman's law office. Skillman's infrastructure is composed of a few servers, for data, email and file sharing. The workstations are integrated to the central authentication virtual server and are all centrally managed. Dedicated servers for each application guarantee network resilience. Custom spam filtering protects their email servers.


    Pollen Design relies on their network for fast data exchange between their Mac workstations, their 3D printer, their Windows virtual machines and their Linux file server. Their phone system was set up using Asterisk and is entirely VoIP. I manage the entire technology and this includes Help Desk, Information Security and Infrastructure Management. Their storage accounts for over 30 terabytes.


    Prepara's network is a mixed environment with Windows, Linux and Mac workstations and servers. Their complex Electronic-Data Interchange system was set up using a combination of Windows and Linux servers. The entire communication between Prepara and their distributors take place using a secure/encrypted channel, over a dedicated Internet circuit. I manage their entire infrastructure.


    Signal Brands manages most of their technology in house. They have outsourced their Help Desk and Infrastructure Management for the New York offices to me. Some recent projects with their offices was the deployment of new wireless-access points that were reconfigured to remove the Double NAT issue that previously caused connectivity issues for the wireless workstations.


    Solfire World is an apparel designer based in Brooklyn, New York. They are one of my few clients outside of New York City. I manage their entire infrastructure, help desk and information security tickets. We have developed custom applications for their suppliers to access the local network from remote. This remote access is fully encrypted and logged to a dedicated vServer.


    I set up Water & Wall Group's technology from scratch. Brand new servers, workstations and phone system were purchased. I worked side by side with the company partners in the buying decision process. W&W's firewall is connected to the Internet over redundant fiber circuits, with a total of over 500 megabits of bandwidth. The circuits are used for data and voice.


    I inherited WnW Capital's technology management from a another IT provider, also based in New York City. I took over the entire management and am the sole IT service provider for voice and data applications. We recently reorganized their Internet circuits, lowering their Internet bills from $1,000 to $600 per month.


    Their technology set up includes over thirty workstations, five file servers, two email servers and one SSLVPN appliance. Each server is dedicated for one application but they are all integrated to the same set of Active Directory servers, which authenticates users and organizes their in-house DNS. Their phone system is a combination of analog and VoIP.


“As a small business which relies on technology to create and deliver work, communicate with our clients, and remain connected when traveling, Conrad’s service, intelligence, and immediate responsiveness are indispensable. We managed our own I.T. in house for three years. Now that Conrad is on our side — the time we save, the security we have gained, and the peace of mind he provides — we cannot believe we didn’t do this much sooner. I whole-heartedly endorse Conrad and his services.”


“The three things that set Conrad apart are his up-to-date knowledge of the daily changes in technology, his fabulous response time to our needs and his consistently pleasant demeanor. He manages our technology challenges, both in the office environment and remotely, as if he is a full-time member of our staff.  I recommend him highly.”


“The IT chaos that took me four long-suffering years to create only took Conrad 24 hours to solve. Conrad is incredibly detail-oriented and always offers easy and speedy solutions to get your business moving forward. From spam lists to Microsoft Exchange and organizing hosting (saving me money!) – I offer my highest praise to Conrad Corporate Technology. And the whole getting-back-to-you-in-15-minutes bit, it’s a lie: he gets back to you in 10!”


“At last I have found an IT consultant who is skilled, knowledgeable, responsive and reasonably priced. Conrad puts his competitors to shame. Our IT setup includes a few servers and multiple workstations, on and offsite.  We also have a VPN network that allows all our employees to work from remote, with full access to the internal resources.”


“Conrad set up all of the technology associated with my small business.  He is accessible, honest, diligent and capable.  He was recommended to me by a professional contact who had used Conrad for his office and I will recommend Conrad to anyone seeking technology support.”


“Over the past 20-plus years, I’ve worked with countless corporate computer tech professionals of every size and level of ability. As good as some of them were, no one comes close to Conrad’s professionalism, attentiveness, client service and response time. If the safe and smooth operating of your tech infrastructure is as critical to your firm’s success as it is to mine, Conrad Corporate Technology should be the first and only call you make.”



Contact me for more information

Your Name (required)

Your Email (required)


Your Message

228 Park Ave S #73758
New York, NY 10003 USA
Phone: 212.729.7122