UnForm is ideal for businesses focusing on distribution, manufacturing ERP solutions, and general accounting.
UnForm® is a platform-independent software product that creates, delivers, stores and retrieves graphically enhanced documents from ERP application printing. A complete, end-to-end document management solution, UnForm interfaces at the point of printing to produce documents in various formats for printing and electronic delivery.
Learn More
Transform months of data modeling and coding into days.
Automatically generate, document, and govern your entire data architecture.
Efficiently model your business and data models, and generate code for your data pipelines, data lakehouse, and analytical applications
Eclipse plug-in to edit Mako Template (http://www.makotemplates.org) files. Provides syntax coloring and a limited outline view.
Please use the update site https://sourceforge.net/projects/makotemplateeditor/files/update-site/ to install this plugin.
We extend the Eclipse IDE with tools for development in Haskell, a functional programming language, providing support for a wide range of tools (compilers, interpreters, doc tools etc.) in a coherent, convenient and configurable environment.
This project provides an editor for the scripting language of Apache's template engine Velocity (http://velocity.apache.org/). The editor is implemented as an plugin for the Eclipse platform (http://eclipse.org/).
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.