Ideal for any lab. Whether you’re just starting up, a small or large academic institution, or a globally operating company.
eLabJournal is an all-in-one Electronic Lab Notebook (ELN) software that includes sample tracking and protocol management modules.
Learn More
Rev Your Digital Product Delivery Engine
Enterprise-grade platform designed to connect strategy, planning, and execution across digital product development and software delivery
Planview links your technology vision directly to teams' daily work, providing complete visibility and control over your digital product delivery ecosystem.
The simplest, fastest way to share business intelligence and analytics
Metabase is the easiest way to let everyone in your company access business data and analytics, learn from it and ask questions. Even if you or your colleagues have no experience in SQL, you can easily summarize and visualize your data, share it and let your team ask questions about it.
Metabase creates beautiful graphs and charts, with an easy-to-use dashboard where everyone can create, organize and share exceptionally visualized data.
SenseRank Sys:
- builds the dictionaries (multidim matrices) of words’ values;
- for the set utterance in certain language builds a figure in multidimensional space (in the matrix space) of values (visual schema), which is topological view of sense
Set of tools and libs for
managing structured data
in a very flexible way:
Imp./Exp. ASCII, XML, SQL,
PS, Tex/LaTex, RTF
GUI: X-Windows, MS-Windows
Interface to C++, DBs, Perl,
PHP, Java, TCP/IP
LISP-like interpreter
written in C++ using C-LIB
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.