CTOs on the Move

BaseballCloud

www.baseballcloud.com

 
BaseballCloud is a data and technology company that provides data solutions to MLB, NCAA, International, Agency, and Amateur organizations throughout the world. Their end-to-end data pipeline allows players, coaches, and scouts to efficiently track, co...
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details
Brian Victorero
Chief Information Officer Profile

Similar Companies

Pragma Systems

Microsoft Certified Windows Telnet and SSH server solution that is FIPS certified, providing a secure server environment. Secure remote access for your Windows systems.

Tech Fabric

A team of dreamers and passionate software developers. We build reliable, scalable and secure web/mobile apps and APIs. Let’s make something amazing together.

Lightyear

Find, compare, and purchase business IT infrastructure (internet, voice, managed wi-fi, etc.) completely online. Stop wasting valuable time gathering quotes. Spend minutes finding services, not days.

Visual Matrix

Since its inception in 2000, Visual Matrix has served the global hospitality industry as a pioneer in advanced hotel property management technology. More than just a full-featured front desk solution, the Visual Matrix all-in-one PMS also provides hoteliers with the ability to maximize profits using a comprehensive revenue analysis platform that is built directly into the PMS. Visual Matrix provides staff with an intuitive user-friendly interface and is available as either a desktop or fully cloud-based solution to suit the unique needs of any hotel business. Based in Richardson, TX, Visual Matrix is the leading PMS supplier to Best Western Hotels & Resorts and currently serves over 2,000 properties across 30 countries.

TrapX Security

TrapX Security is the leader in deception technology. Our solution rapidly detects, analyzes and defeats new zero-day, targeted attacks, and malicious insiders. DeceptionGrid provides automated, highly accurate insight into malicious activities unseen by other types of cyber defenses.