For companies wanting a complete Data Management solution that is native to Salesforce
Verify, deduplicate, manipulate, and assign records automatically to keep your CRM data accurate, complete, and ready for business.
Learn More
SoftCo: Enterprise Invoice and P2P Automation Software
For companies that process over 20,000 invoices per year
SoftCo Accounts Payable Automation processes all PO and non-PO supplier invoices electronically from capture and matching through to invoice approval and query management. SoftCoAP delivers unparalleled touchless automation by embedding AI across matching, coding, routing, and exception handling to minimize the number of supplier invoices requiring manual intervention. The result is 89% processing savings, supported by a context-aware AI Assistant that helps users understand exceptions, answer questions, and take the right action faster.
Tool to parse the command line and configuration files.
Powerful command line and configuration file parsing for C++, Python, Ruby and Java (others to come). This tool provides many features, such as separate treatment for options, variables, and flags, unrecognized object detection, prefixes and much more.
A XML pull-parse library for Java 1.2, designed for
processing XML protocol messages in the most efficient way possible.
Contains a complete HTTP client library.
Repository has been moved to: http://dtitov.github.com/bracer
Java library for parsing and evaluating math expressions.
Javadoc is available at http://bracer.sourceforge.net/javadoc/
P.S. This library depends on Apache Commons Math, so don't forget to include commons-math-2.2.jar to your project.
ShaniXmlParser is a small and fast Xml/Html DOM/SAX non validating parser written in java. It can parse invalid xml files. It uses the org.w3c.dom interfaces and the jaxp interfaces. It works also on mono/.net thanks to ikvm.
Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.