CTOs on the Move

Duo Consulting

www.duoconsulting.com

 
Duo Consulting helps accounting, architecture, financial, law and other professional service firms make the most of their online presence.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

Sheeva.AI

Sheeva.AI has developed an in-car payments and commerce solution that introduces vehicle location-based services to monetize the driver experience. Sheeva`s patented precise geolocation technology allows drivers to seamlessly pay for and receive services such as fueling, electric vehicle charging, parking, curbside pickup and drive-through without leaving the comfort of their vehicle. The Sheeva technology automatically detects the vehicle at the specific gas pump, parking spot, electric vehicle charging space, or drive-through lane and enables payments right on the in-vehicle infotainment screen or in the OEM mobile app. The Sheeva Open API allows OEMs and service providers to integrate payments directly via the cloud and SDK through a secure digital wallet, requiring no additional hardware and no new apps.

Jyacc

Jyacc, Inc is a New York, NY-based company in the Computers and Electronics sector.

Joint Synergy Corp

Joint Synergy Corp is a Huntington Beach, CA-based company in the Computers and Electronics sector.

Innovatech

Innovatech is a Wauconda, IL-based company in the Computers and Electronics sector.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.