Name | Title | Contact Details |
---|---|---|
Tracie Giles |
[Interim] Chief People Officer | Profile |
Courtney Schneider |
Head of People Development | Profile |
Katherine Post Calvert |
Chief Marketing Officer | Profile |
Jill Rock |
Head of Global GTM Talent Acquisition | Profile |
Michael Cucchi |
VP Product and Marketing | Profile |
EOGOGICS INC is a Oakton, VA-based company in the Computers and Electronics sector.
Galactic Information Systems Inc is a Edison, NJ-based company in the Computers and Electronics sector.
Two Six Technologies provides cybersecurity and advanced technology solutions that support missions critical to U.S. national security. Our expertise includes R&D, innovation, productization and implementation in the technology fields of cyber, data science, mobile, microelectronics and information operations. We offer a family of operationally deployed products including Pulse, IKE™, SIGMA™, 8Wire™ and others. Major customers include DARPA, Department of State, U.S. Cyber Command, Department of Homeland Security and the broader Department of Defense and Intelligence Community. Two Six Technologies is a high-growth business with over 285 employees currently, and a global operational footprint that includes a technical presence in more than 40 countries, coupled with native proficiency in more than 20 languages.
Sileg Consulting Inc. is a Toronto, ON-based company in the Computers & Electronics sector.
Welcome to the Meta Layer. Nillion is a public network based on the invention of a novel cryptographic primitive, Nil Message Compute (NMC), which represents a generational leap in decentralized technology and Secure Multi Party Computation (SMPC). Its unique node operation has significant implications for data, security, privacy, and interoperability. In summary, Nillion: 1. Introduces a decentralized way to store and process private information 2. Renders traditional encryption obsolete 3. Enables the creation of a Meta Layer that supercharges and connects existing blockchains (e.g. decentralized secure enclaves, interoperability and more) 4. Enables significant new real world, decentralized applications 5. Is Post Quantum as it uses `encryptionless` technology called Information Theoretic Security.