Achieve harmony across your Apple device fleet with Kandji's unmatched management and security capabilities.
Learn More
Sage Intacct Cloud Accounting and Financial Management Software
Cloud accounting, payroll, and HR that grows with you
Drive your organization forward with the right solution at the right price. AI-powered continuous accounting and ERP to support your growth now and into the future.
clickTk is a graphical editor to generate Perl/Tk GUI.
clickTk is a graphical editor that helps Perl/Tk programmers create Perl/Tk applications consisting of several more or less sophisticated dialogs.
The main goal is to generate Perl/Tk code in form of scripts, subroutines and classes (megawidgets) which can be embedded in the application with or without minor manual interventions
Programmers love to add "todo" notes to the code, where they remain hidden. Todoler is a simple Perl script that parses any text file extracting all "todo"s and placing them into a XML file for import into project management tools.
JMake is a small tool written in Perl (so Perl is required to run this tool), that helps java programmers do certain things a make is supposed to do, like compiling project, packaging jar file, etc.
Deliver and Track Online and Live Training Fast and Easy with Axis LMS!
Axis LMS targets HR departments for employee or customer training,
Axis LMS enables you to deliver learning and training everywhere through a flexible and easy-to-use LMS that is designed to enhance your training, automate your workflows, and engage your learners.
...List of features includes: search for a street and address, search for a bus route, information about objects, plugin architecture, easy customizable code and DB. Based on Macromedia FLASH technolog
Scientific Literate Programming using LaTeX, like tgrind but with high level comments.
In other words, a source code fontifier for literate (real) programmers using LaTeX comments.
NWSL (was NetScript) is an interpreted language based on XML, which supports web-programmers in creating websites or portals containing dynamic content. It also supports XSLT-Transformations for dividing content and presentation.
Programmers' tool written in Perl for taking periodic snapshots (incremental backups) of source codes. Modifications between snapshots are displayed in 2-column format.
Embedded churn will provide developers the freedom to configure an embedded system for any target architecture from a defined template . The ability to deploy the custom image on a flash based device depending on the application of the embedded linux de
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.