| Name | Title | Contact Details |
|---|
Neotech Group is a MontríŠal, QC-based company in the Computers & Electronics sector.
Rebel Networking and Repair is a Oxford, MS-based company in the Computers and Electronics sector.
Syniti is an innovative, global leader in Enterprise Data Management. With smart and powerful resources like our award-winning software platform and premier consultants, Syniti helps the world`s top enterprises create unique advantage and value with their data. Whether the goal is bringing new products to market faster, accelerating time-to-value for a new ERP system or corporate acquisition, powering new AI/ML initiatives, or increasing profitability by eliminating inefficiencies, Syniti ensures your business`s data is a high-performing and trusted asset. Syniti is also a preferred data solution used by the world`s top system integrators, and a portfolio company of BridgeGrowth Partners LLC. Headquartered in Boston, Massachusetts with offices in 25 countries around the world, Syniti operates in all global regions and industry verticals, and maintains a 100% client success rate across thousands of complex data projects and initiatives.
Obverse Corporation is a Washington, DC-based company in the Computers and Electronics sector.
Welcome to the Meta Layer. Nillion is a public network based on the invention of a novel cryptographic primitive, Nil Message Compute (NMC), which represents a generational leap in decentralized technology and Secure Multi Party Computation (SMPC). Its unique node operation has significant implications for data, security, privacy, and interoperability. In summary, Nillion: 1. Introduces a decentralized way to store and process private information 2. Renders traditional encryption obsolete 3. Enables the creation of a Meta Layer that supercharges and connects existing blockchains (e.g. decentralized secure enclaves, interoperability and more) 4. Enables significant new real world, decentralized applications 5. Is Post Quantum as it uses `encryptionless` technology called Information Theoretic Security.