EasySend is a no-code platform that transforms customer journeys
Defy form limits. Create digital experiences.
Evolve forms into smart, AI-powered digital workflows that streamline your data intake and elevate customer experiences.
Learn More
The Cloud Sales Acceleration Platform
For businesses wanting a platform to list, manage, and co-sell on cloud marketplaces with minimal engineering effort
Streamline and automate your cloud sales cycle, enhance operational efficiency, and capitalize on marketplace opportunities with the Clazar Cloud Sales Acceleration Platform.
Web application for long-term monitoring of radioactivity levels
...It includes an open-source Web application (A-GM Manager) running on a SOHO server (e.g. NAS from QNAP for Small Office Home Office servers) connected to a Geiger-Muller radioactivity counter device such as C-GM Counters (https://sourceforge.net/p/c-gm-counter) or compatible counters from GQ Electronics LLC. Other compatible or DIY Geiger-Muller counters could also be used.
PARAMESH is a package of Fortran 90 subroutines designed to provide an
application developer with an easy route to extend an existing serial
code which uses a logically cartesian structured mesh into a parallel
code with adaptive mesh refinement(AMR).
An universal Lan-to-GPIB adapter for lab instruments using the Egnite Ethernut 2.1; code in AVR C; supports http protocals and able to run cgi scripts; Primary interface is command based; software, firmware, and hardware schematics are all available
MOVED: http://code.google.com/p/rssfilter/ Selects and/or rejects articles from RSS feeds based on keywords you supply. Runs in your taskbar! Originally intended to filter new content from scientific journals such as PRL or the arxiv (cond-mat, etc)
Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes.
Track your GenAI risk, run multichannel deepfake simulations, and engage employees with incredible security training.
Assess how your company's digital footprint can be leveraged by cybercriminals. Identify the most at-risk individuals using thousands of public data points and take steps to proactively defend them.