Unified cloud-based platform for dialing, emailing, appointment scheduling, lead management and much more.
Adversus is an outbound dialing solution that helps you streamline your call strategies, automate manual processes, and provide valuable insights to improve your outbound workflows and efficiency.
Learn More
The full-stack observability platform that protects your dataLayer, tags and conversion data
Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.
Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast.
No manual QA. No unreliable data. Just data you can trust and act on.
Bots is a complete translator for edi: edifact, x12, xml, tradacoms
Bots is a complete translator for edi (Electronic Data Interchange).
EDI data formats eg: edifact, x12, tradacoms, xml.
Mail: http://groups.google.com/group/botsmail
Web-site: http://bots.sourceforge.net
Wiki: http://bots.readthedocs.io
Develop: https://github.com/eppye-bots/bots
"Database to CSV" project stores/loads data between database and CSVs
"Database to CSV" allows to back-up data from database(Oracle, MySQL, SQL Server) in the form of CSV files.
Each table data is stored in a separate CSV file.
It also allows to load data from CSV files into the database.
Program can be run from UI or from command line.
There's one more advanced feature which allows merging of data from CSV file to Database.
It is only available from command line.
(It will take foreign keys and unique keys into consideration and then try to insert...
The Time Series Toolbox is a set of software components that simplify the task of building applications that record, process, store and publish time series of observations. Current main application area are sensor networks.
This tool is a small tool to upload a csv file to a database. This tool can analyse a CSV file and it can determine the field lenght and the column name.
Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.