Unimus makes Network Automation and Configuration Management easy.
Deploying Unimus to manage your entire network requires only minutes, allowing for rapid deployment without headaches.
We aim to make automation, disaster recovery, change management and configuration auditing painless and affordable for a network of any size.
Learn More
The Receptionist for iPad | the Original Visitor Management System
Easily keep track of visitors and say goodbye to time-wasting interruptions with The Receptionist for iPad
The Receptionist for iPad is visitor management software that allows users to calm the chaos of the front office. Our digital check-in solution is customizable to your needs; from your company branding, to configurable buttons and drag-and-drop-design badge printing. Effectively manage and track everyone who comes to your workspace and store the information securely in the cloud: no more paper visitor log!
metabase=universal data-storage for "things". with its dynamical structure, it's a strong back-end application. motivation:store any data in an "universal admin" (maybe scrape it from different sources),edit,categorize,reorganizes,process,publis
AhMeBa is an XML file-based metabase engine. It targets small data driven applications that don't require a powerfull database engine or need a light, mobile database such as personal websites and small bussiness applications.
An xml metabase featuring flat namespace access to data, defineable classes with inheritence, and object associations. API and sample coded in C# (csharp dotnet).
This database class provides easy and simple interface to access the most important db function in PHP. It provides implementations for MYSQL, POSTGRESQL, SQLTE, ODBC and has wrapper classes ADODB, METABASE, PEAR and PHPLIB.
Monitoring, Securing, Optimizing 3rd party scripts
For developers looking for a solution to monitor, script, and optimize 3rd party scripts
c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.