Raima Database Manager is an embedded in-memory database for IoT and Edge devices
Built by Developers, for Developers
Raima Database Manager (RDM) is an embedded relational database optimized to run on resource-constrained IoT edge devices that require real-time response. RDM enables intelligent decisions to be made at the device level within microseconds.
Learn More
DataHub is the leading open-source data catalog helping teams discover, understand, and govern their data assets.
Modern Data Catalog and Metadata Platform
Built on an open source foundation with a thriving community of 13,000+ members, DataHub gives you unmatched flexibility to customize and extend without vendor lock-in. DataHub Cloud is a modern metadata platform with REST and GraphQL APIs that optimize performance for complex queries, essential for AI-ready data management and ML lifecycle support.
A planetarium software that shows a 3D simulation of the night sky
Stellarium renders 3D photo-realistic skies in real time with OpenGL. It displays stars, constellations, planets, nebulae and others things like ground, landscape, atmosphere, etc.
SITools2 is a new CNES generic tool performed by a joint effort between CNES and scientific laboratories. The aim of SITools is to provide a self-manageable data access layer deployed on already existing scientific laboratory databases.
SPIDR (Space Physics Interactive Data Resource) is a distributed database and application server network, built to select, visualize and model historical space weather data. SPIDR is a web-application and a grid of data mining web-services.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.