Fax.Cloud delivers encrypted, point-to-point faxing with guaranteed delivery and built-in audit trails
For organizations in regulated industries needing a solution to replace traditional fax infrastructure and integrate with email or online portals
Unlike email or file-sharing tools, Fax.Cloud doesn’t bounce around the internet, exposed and vulnerable. It’s direct, encrypted, and verified. You get delivery confirmation, audit trails, and peace of mind, without the spam filters, metadata leaks, or cyber threats.
Learn More
Arryved POS System
Drive contagious loyalty with your guests and staff with a POS and Brewery Management system that helps run your craft brewery better.
Arryved was built to help craft beverage makers thrive.
Jiddu Krishnamurti's Book of Life|Libro de la Vida
FREE distribution of the JAVA-XML multiplatform e-book about Jiddu Krishnamurti's Book of Life (a witty daily cookie-like reflection). Ahora, lea diariamente los pensamientos de Krishnamurti en castellano- Obtenga una agenda gratis.
MARF is a general cross-platform framework with a collection of algorithms for audio (voice, speech, and sound) and natural language text analysis and recognition along with sample applications (identification, NLP, etc.) of its use, implemented in Java.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
D.U.C.K (Determine segmentation of Unknown words by using Context Knowledge)is an NLP tool, which aims to find the correct segmentation for unknown words in written Hebrew. Statistics from different scopes will be used to determine the segmentation.
Howe is a spoken dialogue system project designed for browsing instructions. The project serves as a base for research on new dialogue system capabilities.
VoxForge collects user-submitted speech audio files for the creation of Acoustic Models for Free and Open Source Speech Recognition Engines such as HTK, Julius, ISIP and Sphinx.
. From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.
DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
Under development for Prof Stephen Hawking and people like him. With control of a single click only, the solution user should Type, Speak, and Command the computer. We want to expand beyond English and MS Windows to multiple languages, multiple platforms
Leo is a project to provide an architecture for defining XML
specifications of grammars for different natural language parsing
systems and tools for using that architecture to permit sharing of
grammar resources across different systems.
BioSap-Blast Integrated Oligonucleotide Selection Accelerator Package. BioSap selects unique oligos for microarrays by detecting user-defined parameters and running parallel instances of Featurama and Blast on compute engines, producing xml output files.