CTOs on the Move

IC Intelligence

www.icintelligence.com

 
Specializing in providing clients with the solutions to unlock the hidden intelligence of their data and discover a new realm of customer value creation.
  • Number of Employees: 0-25
  • Annual Revenue: $0-1 Million

Executives

Name Title Contact Details

Similar Companies

Threedium

Threedium is a 3D engine that provides a comprehensive set of tools for building and scaling Web 3D and AR experiences. Their solutions include 3D Viewers, 3D Configurators, 3D Ads, Intelligent Asset Optimization, Digital Environments, and Gaming. With...

ArcSoft

 ArcSoft is a global leader in image-intelligent technologies that are driving the visual future. We make embedded software that transcends the physical limitations of hardware devices to help people create amazing digital photos, videos and other visual experiences on many of the world’s most popular mobile phones, tablets, and cameras. ArcSoft technologies also power a range of incredible applications spanning facial and object recognition, image search and studio-quality image enhancement. In addition, ArcSoft makes a range of photo, video and imaging software applications for consumers and professionals, from fun apps to pro-editing and encoding software. Our corporate customers and partners include many of the world’s leading OEMs and chip manufacturers, including companies like Samsung, LG, Nokia, Nikon, Olympus, Sony and Qualcomm. ArcSoft software is in more than a billion of the most popular mobile phones, cameras, tablets, and other devices, and in many of the chips that power them.

Eventbrite

Eventbrite is a global marketplace for live experiences that lets people find and create events. Their platform allows for event ticketing, registration, planning, and management.

10K

A Salesforce consultancy built for the way people want to work. Get started faster with on-demand Salesforce talent.

ProvenRun

ProvenRun is a company that provides trusted products and services for embedded security, helping customers embed security within their infrastructure of connected devices wherever this is required, at the chip, device, edge or cloud levels.