| Name | Title | Contact Details |
|---|
Strategics, Inc. is a Chicago, IL-based company in the Software and Internet sector.
As a diversified global technology company, Claranova manages and coordinates a portfolio of majority interests in digital companies with strong growth potential. Supported by a team combining several decades of experience in the world of technology, Claranova has acquired a unique know-how in successfully turning around, creating and developing innovative companies and proven its capacity to turn a simple idea into a worldwide success in just a few short years. Present in 15 countries and leveraging the technology expertise of its 800+ employees across North America and Europe, Claranova is a truly international company, with 95% of its revenue derived from international markets. Claranovas portfolio of companies is organized into three unique technology platforms operating in all major digital sectors. As an e-commerce leader in personalized objects, Claranova also stands out for its technological expertise in software publishing and the Internet of Things, through its businesses PlanetArt, Avanquest and myDevices. These three technology platforms share a common vision: empowering people through innovation by providing simple and intuitive digital solutions that facilitate everyday access to the very best of technology.
Dexco Corporation is a Rouyn-Noranda, QC-based company in the Software and Internet sector.
Consolvant is a San Diego, CA-based company in the Software and Internet sector.
Guardtime brings transparency and accountability to digital society. Founded in 2007, Guardtime invented Keyless Signature Infrastructure (KSI) - a technology that allows any type of electronic activity to be independently verified using only formal mathematical methods, without the need for trusted administrators. Deployed by world governments, KSI provides an independent audit trail for everything that happens in digital society, limiting liability and making it impossible for insiders or sophisticated cyber attackers to manipulate data and cover their tracks.