| Name | Title | Contact Details |
|---|---|---|
Keith Bussey |
Chief Technology and Information Officer | Profile |
Figure Eight is the essential Human-in-the-Loop Machine Learning platform. The Figure Eight technology platform uses machine learning assisted annotation solutions to create the high quality training data needed by models to work in the real world. Figure Eight supports a wide range of computer vision and natural language processing use cases — video object tracking, autonomous vehicles, robotics, predictive maintenance, facial recognition, medical images, aerial and satellite imagery, consumer product detection, content categorization, intelligent chat bots, document transcription, voice assistant training, audio transcription, sentiment analysis, product categorization, and search relevance – and a broad range of industries – automotive, financial services, media and entertainment, retail and ecommerce, technology, agriculture, manufacturing, medical and healthcare, power and utilities, security and surveillance, transportation and travel, and government. The Figure Eight platform operates at an unprecedented scale having generated over 10 billion training data labels to power real world AI applications.
Intrinsic Technologies is a Lisle, IL-based company in the Computers and Electronics sector.
Exalt is a Alpharetta, GA-based company in the Computers and Electronics sector.
InterComponentWare is a Wayne, PA-based company in the Computers and Electronics sector.
In 2016, Black Kite began its journey to redefine third-party risk management (TPRM), building the world`s first security ratings service designed from a hacker`s perspective. With 300+ customers across the globe and counting, we`re committed to improving the health and safety of the entire planet`s cyber ecosystem with the industry`s most accurate and comprehensive cyber intelligence. While other security ratings service (SRS) providers try to narrow the scope, our non-intrusive, powerful scans tell the full story. Black Kite provides the only standards-based cyber risk assessments that analyze your supply chain`s cybersecurity posture from three critical dimensions: technical, financial and compliance.