CLOs on the Move

GeeksOnTime

www.geeksontime.com

 
GeeksOnTime is a Lynden, WA-based company in the Computers and Electronics sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

IntelDec Technologies

ID Technologies has a clear mission – to make it simpler for our Federal Government customers to buy and use IT that`s fit for their purpose. That means combining capability and security with the best time-to-value approach to deliver practical IT solutions. We`re supported by a select group of technology partners, each with truly differentiated capabilities and a shared commitment to achieving the pragmatic outcomes that our customers need. We have been an IT partner to the US Federal Government for over twenty years, operating first as the products division of Intelligent Decisions and now as ID Technologies.

S and S Global Computer Services

S & S Global Computer Services is a Uncasville, CT-based company in the Computers and Electronics sector.

IconNicholson

IconNicholson, LLC is a New York, NY-based company in the Computers & Electronics sector.

Cattle Network

Cattle Network is a Platte City, MO-based company in the Computers and Electronics sector.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.