CTOs on the Move

CorActive High-Tech

www.coractive.com

 
CorActive High-Tech is a Quebec, QC-based company in the Computers and Electronics sector.
  • Number of Employees: 0-25
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

1 Source Technologies

1 Source Technologies is a South San Francisco, CA-based company in the Computers and Electronics sector.

Tarsier Ltd

Tarsier Ltd. (TAER )- formerly Huayue Electronics, Inc., is a publicly traded Delaware Corporation with headquarters in New York City. Tarsier`s mission is to provide "focused solutions for a brighter planet" in the form of energy, Energy Savings, Smart City and Big Data management technologies. Tarsier is currently in the process of acquiring the assets of a number of companies in the energy sector. Once completed, these acquisitions will give Tarsier access to millions of commercial and residential energy customers that are currently purchasing electric and/or natural gas from various other energy re-sellers and utilities.

SDVO SERVICES

SDVO SERVICES is a Boydton, VA-based company in the Computers and Electronics sector.

Canadian Microelectronics Corporation

CMC Microsystems develops, maintains and manages Canada`s National Design Network® (CNDN), giving researchers access to the world`s best design tools, manufacturing technologies, and engineering support for making micro-nanotechnologies, and for training industry-ready graduates. CNDN involves stakeholders in academe, industry, government and intermediary organizations (other not-for profits) across Canada, and internationally. In the last five years, 1300 professors including 800 services subscribers and 8200 graduate students in 63 academic institutions have participated as have the 950 companies in Canada collaborating with professors or hiring graduates.

Cloudentity

Cloudentity extends identity to your APIs and provides continual, contextual authorization at a transaction level, ensuring that APIs—both internal and external—are continuously monitored and access is assessed based on risk and threat intelligence. By leveraging our internal trust engine, and integrations with third-party solutions, we can ensure that each authorization request at an API transaction-level is valid and that suspicious activity is blocked or upgraded to require additional measures of approval Transactional MFA)