For AI teams and Computer Vision team in organizations of all size
AI-Assisted features of the Ango Hub will automate your AI data workflows to improve data labeling efficiency and model RLHF, all while allowing domain experts to focus on providing high-quality data.
Learn More
DriveStrike: Remote Wipe | Data Breach Protection
. From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.
DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
dcm4che is an implementation of DICOM and IHE actors in Java. Homepage: http://www.dcm4che.org, Google Group: http://groups.google.com/group/dcm4che?hl=en, Wiki: http://www.dcm4che.org/confluence, IssueTracking: http://www.dcm4che.org/jira
It helps you track your personal budget and visualises income/expenses
The application helps you track your personal budget income and expenses, and visualises the in and out flows. The visualiser lets you set the targets that you expect to reach in the budget, and the asynchronous transactions scheduler keeps a track of such budget changes in the background. The observations summary panel gives you information on the current status of the budget. The data gets seamlessly highly encrypted underneath the system.
The most popular mindmapping and brainstorming software
Professional and powerful brainstorming and mind mapping software tool, open source, Eclipse Community Award winner, often used for capture ideas, knowledge/project management and GTD, supporting fishbones/org-charts/tree charts/spreadsheets, easy-to-use.
Streamline operations and elevate your team's efficiency with PairSoft. Our AP automation, procurement, and document management solutions eliminate manual processes, cut costs, and free your team to focus on strategic initiatives. Experience our state-of-the-art invoice-to-pay solution, now integrated with advanced AI technology for faster, smarter results. Our customers report a significant 70% reduction in approval times and annual savings of $62,000 in employee hours. At PairSoft, we aim to transform your business operations through automation. Explore the future of automation at pairsoft.com, where you can leverage cutting-edge features like invoice capture, OCR, and comprehensive AP automation to transform your workflow. Whether you are a small business or a large enterprise, our solutions are designed to scale with your needs, providing robust functionality and ease of use. Join the growing number of businesses that trust PairSoft.
NOTE: Blue's SourceCode, Issue Tracker, and new releases have moved to http://www.github.com/kunstmusik/blue. Older file Releases and Mailing Lists remain here on Sourceforge at this time.
blue is a music composition environment for use with the Csound sound system. It is written in Java and runs on Linux, Windows, and MacOSX.
Beat tracking software that produces a real time beat-pattern hierarchy with real time latency requirements. The system utilizes a blackboard structure over amplitude to construct the beat hierarcy from a standard JMF input stream.
BaseX is a light-weight, high-performance and scalable XML database system and XPath/XQuery processor, including full support for the W3C Update and Full Text extensions. The issue tracker has been moved to https://github.com/BaseXdb/basex/issues
Freshet - an advanced web interface to the Fluid streaming engine, with a customizable ID3 Tag database, secure login with user-based song request tracking, and a plugin for on-the-fly bit rate conversion.
Trip Tracker is a position tracking client-server system. A real time tracking environment can be set up with a GPS receiver and a tracking server. The map client can show the map position of the GPS client in real time.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
The Data Fusion Peer is a multitier computer vision internet application. The system provides image processing, motion tracking, and visualization information. Application will convert data into 3-Deminsional and other digital environments.