| Name | Title | Contact Details |
|---|
Novetta specializes in advanced analytics solutions that extract clarity from complex data, delivering actionable intelligence at speed and scale to address challenges of national and global significance. Focused on mission success, Novetta has pioneered disruptive technologies in data analytics, full-spectrum cyber, media analytics, and multi-INT fusion for Defense, Intelligence Community, and Federal Law Enforcement customers.
Mijem is a Canadian-based social media and technology company that provides innovative solutions to create a vibrant social marketplace for Generation Z to connect and to efficiently buy, sell and trade goods and services. Mijem`s patent-pending flagship technology currently permits thousands of university and college students across the United States and Canada to both connect on-line and engage in consumer-to-consumer commerce. The Mijem app can be downloaded from the App Store or Google Play.
STOOPS CONSULTING is a Marysville, WA-based company in the Computers and Electronics sector.
OLAH Healthcare Technology, LLC is the market leader in reducing costs, resources and risks associated with decommissioning legacy systems. OLAH Healthcare has over fifteen years of specializing in legacy clinical systems with experience in working with a broad array of hospitals, physician practices and imaging systems. Trusted with the most litigious and challenging medical record systems, OLAH Healthcare has helped over 300 healthcare organizations across North America. OLAH Healthcare is recommended by leading healthcare IT vendors to provide the best decommissioning solutions and strategies for both structured and unstructured data.
Hoxhunt is a human risk management platform that goes beyond security awareness to drive behavior change and measurably lower risk. We combine AI and behavioral science to create individualized micro-training experiences people love. Employees learn to detect and report advanced phishing attacks. Operations teams respond fast with limited resources. And security leaders gain outcome-driven metrics to document reduced cybersecurity risk.