JS7 JobScheduler is an open source workload automation solution.
JS7 offers cross-platform job execution, managed file transfer, complex no-code job dependencies and a real REST API.
JS7 JobScheduler is an open source workload automation solution. It is used to run executable files, shell scripts etc. and database procedures.
Learn More
Native Teams: Payments and Employment for International Teams
Expand Your Global Team in 85+ Countries
With Native Teams’ Employer of Record (EOR) service, you can compliantly hire in 85+ countries without setting up a legal entity. From dedicated employee support and localised benefits to tax optimisation, we help you build a global team that feels truly cared for.
RText is a customizable programmer's text editor written in Java. Some of its features include: syntax highlighting, editing multiple documents at once, printing and print preview, find/replace/find in files dialogs, undo/redo, and online help.
A WebDAV browser and remote file editing framework written in Java, including an RFC-2518-compliant WEBDAV client library with optional SSL support, a low-level DAV command-line client (written in JPython), and a built-in text editing component.
The WebEditor application is a Applet Text Editor and File Manager for Managing Files and Editing them without the need for a client side FTP or TextEditor. The Applet has syntax colorizator for most web scriptin languages.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.