dbt Labs empowers data teams to build reliable, governed data pipelines—accelerating analytics and AI initiatives with speed and confidence.
Data teams use dbt to codify business logic and make it accessible to the entire organization—for use in reporting, ML modeling, and operational workflows.
Learn More
Attack Surface Management | Criminal IP ASM
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
jPersist is an object-relational persistence API with automatic mapping, and based on the ActiveRecord and DataMapper patterns. jWebApp is an MVC web application framework. Both are configuration and annotation free and can be learned in minutes
SPARQL to Object Oriented eNgine allows users to expose their traditional data sources (RDBMS, OODBMS, XML, LDAP, ecc) as RDF data, through a SPARQL endpoint.
Java Todo List Manager is a web based application that can be used for creating, editing and maintaining a todo list. Todo lists can be shared with others as well.