CTOs on the Move

J and B Machine

www.jbmachine.com

 
J and B Machine is a Porter, TX-based company in the Software and Internet sector.
  • Number of Employees: 25-100
  • Annual Revenue: $1-10 Million

Executives

Name Title Contact Details

Similar Companies

f2 Technology

f2 Technology is a Decatur, GA-based company in the Software and Internet sector.

Cataphora

Cataphora is an award winning, employee-owned software company providing technology and services for high end litigations and investigations. Its customers include Fortune 500 companies, governmental agencies, and top American law firms. We pride

DataDirect Networks

DataDirect Networks (DDN) is the world’s leading big data storage supplier to data-intensive, global organizations. For more than 18 years, DDN has designed, developed, deployed and optimized systems, software, and storage solutions that enable enterprises, service providers, universities and government agencies to generate more value and to accelerate time to insight from their data and information, on premise and in the cloud. Organizations leverage the power of DDN storage technology and the deep technical expertise of its team to capture, store, process, analyze, collaborate and distribute data, information and content at largest scale in the most efficient, reliable and cost effective manner. DDN customers include many of the world’s leading financial services firms and banks, healthcare and life science organizations, manufacturing and energy companies, government and research facilities, and web and cloud service providers.

Myia Health

The human body tells remarkable stories. It provides information that can help better prevent illness, manage chronic conditions, and redefine the quality of daily life. But for too long, those stories have gone unheard, that information left unactioned.

Centrify

Centrify is a leader in securing enterprise identities against cyberthreats that target today`s hybrid IT environment of cloud, mobile and on-premises. Centrify helps protect against the leading point of attack used in data breaches ― compromised credentials — by securing an enterprise`s apps and infrastructure for all its users.