| Name | Title | Contact Details |
|---|
StitcherAds is an easy-to-use and powerful direct response advertising management platform.
Figure Eight is the essential Human-in-the-Loop Machine Learning platform. The Figure Eight technology platform uses machine learning assisted annotation solutions to create the high quality training data needed by models to work in the real world. Figure Eight supports a wide range of computer vision and natural language processing use cases — video object tracking, autonomous vehicles, robotics, predictive maintenance, facial recognition, medical images, aerial and satellite imagery, consumer product detection, content categorization, intelligent chat bots, document transcription, voice assistant training, audio transcription, sentiment analysis, product categorization, and search relevance – and a broad range of industries – automotive, financial services, media and entertainment, retail and ecommerce, technology, agriculture, manufacturing, medical and healthcare, power and utilities, security and surveillance, transportation and travel, and government. The Figure Eight platform operates at an unprecedented scale having generated over 10 billion training data labels to power real world AI applications.
Windward`s predictive intelligence solution fuses AI, big data, and maritime expertise to enable clients and partners to understand the maritime ecosystem and its broader impact on security, finance, and business.
Factorum is a Canton, CT-based company in the Computers & Electronics sector.
Trinity Cyber, Inc. is a US based corporation that invents and sells technology to solve the most difficult cyber security challenges. The company patented the first ever technology that can deeply interrogate full-session network traffic in full application layer context and modify it for security in-line, at network speed. The company`s products and services range across several multibillion dollar market segments including network detection and response (NDR), managed detection and response (MDR), intrusion prevention systems (IPS), threat hunting services, threat intelligence (TI), data loss prevention (DLP), content disarm and reconstruction (CDR), and deception technology.