Iris Powered By Generali - Iris puts your customer in control of their identity.
Increase customer and employee retention by offering Onwatch identity protection today.
Iris Identity Protection API sends identity monitoring and alerts data into your existing digital environment – an ideal solution for businesses that are looking to offer their customers identity protection services without having to build a new product or app from scratch.
Learn More
Network Management Software and Tools for Businesses and Organizations | Auvik Networks
Mapping, inventory, config backup, and more.
Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
Basically will be a family of BASIC-to-C/C++ translators, able to use multiple dialects of BASIC on the input side, and producing ANSI C or C++. (Note that the old name, "Visible", is still the name of the classic VB translator.)
Translates state machine into a target programming language.
SMC takes a state machine stored in a .sm file and generates a State pattern in 14 programming languages. Includes: default transitions, transition args, transition guards, push/pop transitions and Entry/Exit actions. See User Manual for more info.
A complete cleanup (for readability and ease of coding) and doccumentation of the original SMAUG 1.4a codebase, SLAM-GTP is also a minor re-write, bringing new features to the codebase, while also fixing and/or adding functionality to existing ones.
Set of Add-ins to run standard Cygwin/Unix commandline facilities from Excel. Creates batch files, runs them as part of excel (or independent of) to : ZIP, GZIP, BZIP2 files, dos2unix & unix2dos files. Also automates DOS DIR to list files to spreadsheet
Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.