| Name | Title | Contact Details |
|---|
Lund Performance Solutions is a Albany, OR-based company in the Computers and Electronics sector.
Fetch is America`s leading consumer-engagement platform that rewards shoppers for buying the brands they love. The Fetch app gives users the easiest way to save on everyday purchases by simply scanning their receipt. For our brand partners, the platform allows them to understand a 360 degree view of shopping habits, and to meaningfully reward a customer`s individual loyalty.
Earth Signal Processing Ltd. is a Calgary, AB-based company in the Computers and Electronics sector.
Founded in 2021 by renowned practice consultant Terri Ross, APX (Aesthetic Practice Accelerator) Platform is a business intelligence, employee education, training, and data analytics platform built on three pillars: Training, Analytics and Coaching/Community. APX Platform combines the three into one easy-to-use, cloud solution that: optimizes employee productivity via on-demand Sales, Finance, and Operations training courses; translates EMR/Practice Management data into actionable KPIs via financial calculator templates and industry benchmarking; and provides ongoing business coaching and mentorship via live coaching sessions with Terri Ross and her team.
TXOne Networks provides solutions for tackling security weaknesses prevalent across industrial environments. We listen to the needs of both leading manufacturers and critical infrastructure operators to develop the best actionable approach within partnering companies. The result is customized technology that goes beyond traditional security tools to mitigate complex challenges. Given the ICS environments are layered and composed of a variety of equipment in different operating systems, TXOne Networks offers both network-based and endpoint-based products to secure the OT network and mission critical devices in a real-time defense-in-depth manner. Both IT and OT can have comprehensive visibility regarding the ICS assets, protocols, control commands, risks, and threats. The goal is not only to maximize ICS protection, but also to keep the business and operation running even when security is being breached in some way.