CTOs on the Move

Figure Eight

www.figure-eight.com

 
Figure Eight is the essential Human-in-the-Loop Machine Learning platform. The Figure Eight technology platform uses machine learning assisted annotation solutions to create the high quality training data needed by models to work in the real world. Figure Eight supports a wide range of computer vision and natural language processing use cases — video object tracking, autonomous vehicles, robotics, predictive maintenance, facial recognition, medical images, aerial and satellite imagery, consumer product detection, content categorization, intelligent chat bots, document transcription, voice assistant training, audio transcription, sentiment analysis, product categorization, and search relevance – and a broad range of industries – automotive, financial ...
  • Number of Employees: 100-250
  • Annual Revenue: $10-50 Million

Executives

Name Title Contact Details
Robert Munro
Chief Technology Officer Profile

Similar Companies

Solid Systems Cad Services

Solid Systems Cad Services is a Houston, TX-based company in the Computers and Electronics sector.

One Convergence

One Convergence is a Santa Clara, CA-based company in the Computers and Electronics sector.

Accudata Systems

Accudata Systems is a Houston, TX-based company in the Computers and Electronics sector.

RMI

RMI is a Atlanta, GA-based company in the Computers and Electronics sector.

TXOne

TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.