HR Execs on the Move

Logility, Inc.

www.logility.com

 
Logility, Inc. (Logility) provides supply chain management solutions to streamline the market planning, management, production, and distribution of products for manufacturers, suppliers, distributors and retailers.
  • Number of Employees: 100-250
  • Annual Revenue: $50-100 Million
  • www.logility.com
  • 470 E Paces Ferry Rd NE
    Atlanta, GA USA 30305-3301
  • Phone: 800.762.5207

Executives

Name Title Contact Details
Lachelle Buchanan
Vice President of Product Marketing | Digital Supply Chain Platform | B2B SaaS Profile
Erik Secan
VP Sales - South and West Region Profile
Lynne Goldsman
Research Director, Innovation Team, R&D Profile
Amanda Greer
Vice President - Customer Support Profile
Daniel Bachar
Vice President, Product Marketing Profile

Similar Companies

NexGenSolutions

NexGenSolutions is a company that specializes in integrated CAD/CAM solutions, providing sales, consulting, training, and support. They offer a variety of CAM software and training options to help keep machines productive and minimize downtime.

Ottawa Wireless Cluster

Ottawa Wireless Cluster is a Stittsville, ON-based company in the Software & Internet sector.

Stellar Innovations

The Choice For Professional and Managed Services. Steller Innovations & Solutions Provides Professional Services & Information Technology Support

Visual Harbor

Visual Harbor is a Norfolk, VA-based company in the Software and Internet sector.

Finjan Holdings

Through our subsidiary, Finjan, Inc., the Company owns a portfolio of patents, related to software that proactively detects malicious code and thereby protects end users from identity and data theft, spyware, malware, phishing, trojans and other online threats. Finjan`s mission is to invest in innovation and encourage the development of core intellectual property. Founded in 1997, Finjan developed and patented technology that is capable of detecting previously unknown and emerging threats on a real-time, behavior-based basis, in contrast to signature-based methods of intercepting only known threats to computers, which were standard in the online security industry during the 1990`s.