Business password and access manager solution for IT security teams
Simplify Access, Secure Your Business
European businesses use Uniqkey to simplify password management, reclaim IT control and reduce password-based cyber risk. All in one super easy-to-use tool.
Learn More
Tremendous is the global payouts platform for businesses sending gift cards and money at scale.
Getting started is simple: add a funding method and place your first order in minutes.
Trusted by 20,000+ leading organizations, Tremendous has delivered billions of rewards and enables businesses to reach recipients across 230+ countries and regions. Recipients have 2,500+ payout options to choose from, including gift cards, prepaid cards, cash transfers, and charitable donations.
Pioneering Private and Public Cloud Management since 2008
The UnifiedSessionsManager supports the integrated management of user sessions within Private-Clouds, comprising heterogeneous IT landscapes of various physical and virtual machines, hypervisor management, and virtual user sessions with remote desktops.
Extracted documents see https://sourceforge.net/projects/ctys-doc.
The Network-Integrated Multimedia Middleware (NMM) is a flow graph based multimedia framework that allows to create distributed multimedia applications: local and remote multimedia devices or software components can be combined.
WOSH is a multi-platform message-oriented middleware written in ANSI C++. Service oriented architecture, designed for network distributed computing. Already working: Audio multimedia, X10, remote control (WinMobile, GTalk) and much more..
The Karoo Project is a framework for making it practical to create distributed applications. By "practical", I mean that it must do it uncomplicatedly, efficiently, and cheaply. This project provides application management, queuing, and IPC.
Discover the cyber platform that secures and insures SMEs
In a world that lives and breathes all things digital, every business is at risk. Cybersecurity has become a major problem for small and growing businesses due to limited budgets, resources, time, and training. Hackers are leveraging these vulnerabilities, and most of the existing cybersecurity solutions on the market are too cumbersome, too complicated, and far too costly.