Hightouch is a data and AI platform for marketing and personalization.
Marketing needs data and AI. Give them Hightouch.
Find insights, run real-time campaigns, and build AI agents with all your data.
Learn More
Endpoint Protection Software for Businesses | HYPERSECURE
DriveLock protects systems, data, end devices from data loss and misuse.
The HYPERSECURE endpoint protection platform is a comprehensive suite of products and services enhanced by European third-party solutions. It ensures our customers’ IT security, regulatory compliance, and digital sovereignty.
"Aubit 4GL" is a project to make GPL, OpenSource, Informix-4GL compatible compiler, and continue to extend functionality needed to write most efficient and productive business related, database oriented applications. See "Home Page" link for more.
XML Code Generator and Framework for Java, helps you develop high-volume XML Parsers quickly and consistently. Unlike most development tools, xml2j does not force you to use a vendor specific API; using our generator the model is the API.
The code generator uses XSLT to transform XML Schema to Java code and is fully adaptable. With XSD there are many different possible approaches to defining a schema for your XML, therefore the generator first normalizes the XSD to an XML fit for code...
Parse software messages and transform them into actions. LazyBat has a command line utility which can transform input data, and also a parser generator for C/C++. LazyBat doesn't support recursive parsing, but rather focuses on common parsing jobs.
Set of tools and libs for
managing structured data
in a very flexible way:
Imp./Exp. ASCII, XML, SQL,
PS, Tex/LaTex, RTF
GUI: X-Windows, MS-Windows
Interface to C++, DBs, Perl,
PHP, Java, TCP/IP
LISP-like interpreter
written in C++ using C-LIB
Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes.
Track your GenAI risk, run multichannel deepfake simulations, and engage employees with incredible security training.
Assess how your company's digital footprint can be leveraged by cybercriminals. Identify the most at-risk individuals using thousands of public data points and take steps to proactively defend them.
A framework for highly customisable e-commerce: A system for automatically build an e-commerce interface supporting product´s contraints and properties.