MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design.
Microstation enables architects, engineers, and designers to create precise 2D and 3D drawings that bring complex projects to life.
MicroStation is the only computer-aided design software for infrastructure design, helping architects and engineers like you bring their vision to life, present their designs to their clients, and deliver their projects to the community.
Learn More
Quality Management Software
Ideal for small to medium-sized businesses. Pay for all the modules or only the ones you need.
isoTracker Quality Management is a popular cloud-based quality management software (QMS) that is used by small to medium sized businesses on a worldwide basis. It helps to manage ISO 9001, ISO 13485, ISO 22000, ISO 17025, ISO 14001 systems...plus many similar other systems. It also conforms to the requirements of 21 CFR Part 11.
The Open Modeling Interface and Environment (OpenMI) defines a standardized way to exchange data between computational models that run simultaneously. OpenMI aims to enhance process interaction representation in integrated environmental modelling.
Real-time Low Latency High-Frequency data streaming API
This project contains the working artifacts for the development of the Energistics Transfer Protocol. There is NO Wiki. To review documentation, clone or download the repository and look in the documentation directory. You can access on line using the [Browse Code] button.
KartoMNT is a free software of height model digitalization.
This software allows you to create your own Digital Height Models (DHM) with a simple map. Then you'll be able to visualize DHMs with the KartoMNT 3D viewer.
Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes.
Track your GenAI risk, run multichannel deepfake simulations, and engage employees with incredible security training.
Assess how your company's digital footprint can be leveraged by cybercriminals. Identify the most at-risk individuals using thousands of public data points and take steps to proactively defend them.