| Name | Title | Contact Details |
|---|
Idenovo Systems Inc is a Newmarket, ON-based company in the Software and Internet sector.
enChoice is a leading provider of end-to-end enterprise content management (ECM) solutions and services.
Intellicure was created by David Walker and Dr. Caroline Fife, who knew there had to be a solution to the long hours of charting and inconsistences in documentation that plagued wound care and hyperbaric clinics. With David`s background in hyperbaric medicine and Dr. Fife`s experience in running a wound care clinic, IntelliTrak and HyperTrak were born. Intellicure`s flagship product, Intellicure EHR, began development in 1995 at the University of Texas Health Science Center in Houston, Texas as an answer to the growing problem of timeliness and accuracy of dictation and patient charting. In late 2000, both programs were brought together and Intellicure was formed.
Ever since Adaptive Insights` (formerly Adaptive Planning) founding in 2003, our mission has remained constant – to provide powerful yet intuitive solutions that fundamentally change the world of business analytics for companies and nonprofits of all sizes. We`ve been making excellent progress in delivering on this mission over time. We set the standard for cloud business intelligence (BI) and corporate performance management (CPM) solutions, with the most customers, best partners, strongest financials, best user experience, and highest customer satisfaction.
WinMagic Inc. provides application aware Intelligent Key Management for everything encryption, with robust, manageable and easy-to-use data security solutions. WinMagic’s SecureDoc secures data wherever it is stored, providing enterprise grade data encryption and key management policies across all operating systems while enabling a unified encryption strategy across any end point and virtualized or Cloud IaaS environment. SecureDoc is trusted by thousands of enterprises and government organizations worldwide to minimize business risks, meet privacy and regulatory compliance requirements, while protecting valuable information assets against unauthorized access.