LEADTOOLS
LEAD Technologies is the developer and publisher of LEADTOOLS, the award-winning line of development toolkits. LEADTOOLS is a family of comprehensive toolkits designed to help programmers integrate raster, document, medical, multimedia, and vector imaging into their desktop, server, tablet, and mobile applications. LEADTOOLS gives developers the most flexible and powerful imaging technology, offering development support for OCR, Barcode, Forms Recognition, PDF, Document Conversion and Viewing, Document Cleanup, Annotations, DICOM, PACS, HL7, Audio/Video Codecs, MPEG-2 Transport, DVR, Streaming, File Formats (150+), Image Compression, Image Processing, Color Conversion, Viewers, Special Effects, Scanning/Capture, Common Dialogs, Printing, and more. A LEADTOOLS toolkit literally puts millions of lines of code at the fingertips of application developers. Whatever your programming needs, LEAD has a toolkit specifically designed to give you the best imaging technology available.
BoostSolutions
BoostSolutions is a leading developer of SharePoint solutions that bridge the gap between SharePoint out-of-the-box and the custom functionality needed to make daily business operations smooth and efficient.BoostSolutions believe that all businesses should have access to advanced technology solutions tailored to their specific needs and delivered with professional service and support. BoostSolutions have developed a complete suite of fully-customizable SharePoint solutions for just this purpose, designed to unlock the full potential of SharePoint.
SecureTeam
SecureTeam helps companies all around the world protect their revenue stream and intellectual property. SecureTeam's advanced .NET code protection technology delivers a layered protection approach that combines method level code encryption, obfuscation, licensing, and anti-reverse engineering countermeasures embedded into existing application code. All together SecureTeam provides customers with the means to protect their .NET applications against piracy, code theft and malicious tampering.