| Name | Title | Contact Details |
|---|
Sankay Systems is a Princeton Junction, NJ-based company in the Computers and Electronics sector.
By Light is a Arlington, VA-based company in the Computers and Electronics sector.
Kelcon Technologies is a Mission, KS-based company in the Computers and Electronics sector.
IndependenceIT's Cloud Workspace is a desktop-as-as service software platform that allows service providers and IT departments to deploy complete workspaces in the cloud, delivering Windows desktops, business and productivity applications, and a complete back-office system to users anywhere, anytime, on any device, and provisioned and managed with the same ease and flexibility. Cloud Workspace allows organizations to support mobile, distributed workers, embrace BYOD as a corporate strategy, and increase responsiveness and service quality, all without compromise to security, performance or control. ISVs use the power of our platform to transform their business into a SaaS model without expensive redevelopment efforts, while VARs and service providers leverage Cloud Workspace's white-label capabilities and API to seamlessly integrate DaaS solutions into their service portfolios and management and provisioning systems.
Cyber Security Company – anti-ad fraud software company providing digital revenue protection through patent protected technology and expert teams. "Adtech cyber security software that eliminates advertising fraud, saving advertisers and publishers billions, annually. We are the Nortons of AdTech." Ad leakage is ubiquitous, and often attributed to bad reporting, ad-ops errors or just sagging eCPMs. But, what if there was a logical explanation hiding in plain sight? - Inventory reports don`t match inventory sold - Ad revenue is impossible to explain - eCPM continues to dip while premium inventory goes unfilled - Analytics don`t match available inventory DEVCON uses it`s patent protected technology, QCA, NSA developer and white hat hackers to protect your companies digital revenue. - Malvertising real-time blocking - Systems auditing - Fraud detection - Situation management - Monitoring - Behavioral database - Analytical platform