The full-stack observability platform that protects your dataLayer, tags and conversion data
Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.
Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast.
No manual QA. No unreliable data. Just data you can trust and act on.
Learn More
Get full visibility and control over your tasks and projects with Wrike.
A cloud-based collaboration, work management, and project management software
Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
Mature LDAP, LDIF and DSML client with i18n support.
A java LDAP client with LDIF support, security (inc SSL, SASL & GSSAPI), translated into many languages (inc. Chinese), online help, user forms and many other features.
The commercial version is available at https://jxworkbench.com for $9.95. It extends JXplorer to include:
- custom LDAP reporting - to pdf, word etc.
- Find and Replace with regexp and attribute substitution
- A secure password vault to store directory connections
- etc.
LDAP client providing user friendly access to global address books.
An LDAP Client, written in Java, designed to act as the front end for a global address book implemented as an LDAP directory. Supports full read/update/delete access to directory entries. Fully configurable for all schemas.
cSuite is a large "suite" of modules including a helpdesk, project/parts/client/workflow management, etc., written in Java with a MySQL backend. Version 1.0.0 expected Spring 2006.
WebLDAPClient is a generic, web-based interface (AJAX) LDAPv3 client. It can handle multiple servers simultaneously, supporting all common LDAP operations (browse, search, modify, schema-browsing, LDIF..).
Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.