• DriveStrike: Remote Wipe | Data Breach Protection Icon
    DriveStrike: Remote Wipe | Data Breach Protection

    . From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.

    DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
    Learn More
  • Online Project Management Platform - Zoho Icon
    Online Project Management Platform - Zoho

    A plan put together with small businesses and startups in mind.

    Zoho Projects is a cloud-based project management solution that helps teams plan, track, collaborate, and achieve project goals.
    Learn More
  • 1
    The Object-Role Modeling (ORM) standard version 2, associated schemas and generation tools, and a reference implementation in the form of the Natural Object-Role Modeling Architect for Visual Studio (NORMA) product.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    xuse requirements & use case management
    Xuse manages requirements, use cases & other artefacts that drive software design. Xuse focuses on clear documentation & communication. It defines an XML data model for requirements & use cases with XSLT providing multiple derived views: HTML/SVG/PDF. Note there is no GUI for entering requirements, however another project (https://sourceforge.net/projects/xguse/) will provide a GUI.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    XmlHttpLib(XHL) is a pure java developers library and cmd line tool for executing http requests with xml-input(, converting response html to xhtml) and transforming it with xslt to grab information from webpages.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    ActivityScript takes an activity diagram (created with a UML tool) and executes it's contents. The content of Activity boxes are executed, the Guards of a Decision box are evaluated to control program flow and Fork boxes initiate new threads.
    Downloads: 0 This Week
    Last Update:
    See Project
  • ACI Learning: Internal Audit, Cybersecurity, and IT Training Icon
    ACI Learning: Internal Audit, Cybersecurity, and IT Training

    Proven skill building for every aspect of your support or IT team.

    Traditional training doesn't equip employees with the practical skills they need to drive business success. ACI Learning provides hands-on IT and cybersecurity training designed to build real-world, on-the-job skills. Our outcome-based programs empower employees with certification prep, industry-recognized credentials, and flexible learning options. With expert-led video training, labs, and scalable solutions, we help businesses, individuals, governments, and academic institutions develop a skilled workforce, align with business goals, and stay ahead in a rapidly evolving digital world.
    Learn More
  • 5
    ModelPro, part of ModelDriven.org, is a provisioning engine for producing executable applications and other artifacts out of models using the Model Driven Architecture (MDA) paradigm. ModelPro is internally Model-Driven based on provisioning cartridges
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB