CTOs on the Move

VisualSP

www.visualsp.com

 
VisualSP was established in 2004 as site to assist folks in charge of developing and administering SharePoint. We have grown, are now a leading provider of training and consulting for SharePoint.
  • Number of Employees: 0-25
  • Annual Revenue: $0-1 Million
  • www.visualsp.com
  • 13400 S Route 59 Ste 116-214
    Plainfield, IL USA 60585
  • Phone: N/A

Executives

Name Title Contact Details

Similar Companies

netCustomer

netCustomer is a San Jose, CA-based company in the Computers and Electronics sector.

AD3R Technologies Inc

AD3R Technologies Inc is a Longueuil, QC-based company in the Computers and Electronics sector.

ProtocolNow

ProtocolNow is a software platform that houses the protocol lifecycle. In business, protocols are everywhere, and properly managed and followed protocols deliver more consistent service and results. ProtocolNow empowers clients to develop, train on, apply and refine protocols with their easy-to-use proprietary platform.

Vewd

Vewd is the leading provider of OTT and hybrid TV solutions, shipping on almost 40 million connected TVs, set-top boxes, game consoles, and cars each year. Our suite of products and services simplify complexity and offer solutions that unite the entire content delivery value chain, from silicon vendors to end-users. Market leaders such as Sony, Hisense, TPV, Vodafone, Sagemcom, and many more rely on Vewd products and services.

Nillion

Welcome to the Meta Layer. Nillion is a public network based on the invention of a novel cryptographic primitive, Nil Message Compute (NMC), which represents a generational leap in decentralized technology and Secure Multi Party Computation (SMPC). Its unique node operation has significant implications for data, security, privacy, and interoperability. In summary, Nillion: 1. Introduces a decentralized way to store and process private information 2. Renders traditional encryption obsolete 3. Enables the creation of a Meta Layer that supercharges and connects existing blockchains (e.g. decentralized secure enclaves, interoperability and more) 4. Enables significant new real world, decentralized applications 5. Is Post Quantum as it uses `encryptionless` technology called Information Theoretic Security.