Showing 1 open source project for "computer aided dispatch"

View related business solutions
  • Self-hosted password manager Icon
    Self-hosted password manager

    Developed and headquartered in Europe (Barcelona, Spain), Passwork meets GDPR, NIS2, ENS and other European regulatory requirements by design.

    On-premise solution with double encryption and certified development processes for maximum protection of corporate data. Zero‑knowledge architecture ensures your passwords never leave your infrastructure.
    Learn More
  • HR Outsourcing Built for Small and Midsize Businesses Icon
    HR Outsourcing Built for Small and Midsize Businesses

    Payroll. Benefits. Compliance. Technology. All in one place.

    TriNet is a leading provider of HR outsourcing solutions built for small and midsize businesses. Its platform combines payroll, benefits, risk management, compliance, and HR technology in one integrated system. Through its PEO (Professional Employer Organization) and HR Plus (ASO) offerings, TriNet helps companies streamline HR administration, stay compliant, and access enterprise-level benefits. Businesses can run payroll efficiently, manage compliance with complex state and federal regulations, and offer competitive employee benefits with ease. The company’s intuitive HR platform also automates time tracking, leave requests, and onboarding. With TriNet, organizations can focus on growth while ensuring their people and processes are supported by expert HR guidance.
    Learn More
  • 1
    ODS3 Virtual Machine Challenge

    ODS3 Virtual Machine Challenge

    Virtual Machine Image To Test Penetration Skills

    The ODS3 Virtual Machine Challenge are downloadable images that can be run as VMWare or VirtualBox instances. The Idea behind the challenge is to test and exercise web application penetration testing in a controlled environment. These images are great for cyber security students, penetration testers and hobbyist. Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
    Downloads: 29 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB