Showing 8 open source projects for "computer aided dispatch"

View related business solutions
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • Inspections+ Mobile forms for Dynamics 365 - Resco.net Icon
    Inspections+ Mobile forms for Dynamics 365 - Resco.net

    Start collecting field data without the hassles of complicated development thanks to resco.Inspections' native integration with Dynamics 365.

    Equip your frontline teams with a robust digital solution to simplify data collection and reporting. Handle inspections and audits effortlessly, even in remote locations, and create comprehensive reports on the spot, all integrated with Dynamics 365.
    Learn More
  • 1
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Leader badge
    Downloads: 12 This Week
    Last Update:
    See Project
  • 2

    Iris Recognition System

    Iris Recognition System Matlab source code

    Biometrics is one of the most important and reliable methods for computer-aided personal identification. It has a wide range of applications, in government programs such as national ID cards, use in visas and visa processing, and in the war against terrorism, as well as having personal applications in areas such as logical and physical access control. Iris recognition is the most accurate personal identification biometric and it is this that accounts for its use in identity management in government departments requiring high security. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    ODS3 Virtual Machine Challenge

    ODS3 Virtual Machine Challenge

    Virtual Machine Image To Test Penetration Skills

    The ODS3 Virtual Machine Challenge are downloadable images that can be run as VMWare or VirtualBox instances. The Idea behind the challenge is to test and exercise web application penetration testing in a controlled environment. These images are great for cyber security students, penetration testers and hobbyist. Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 4
    CACANMS is an acronym for Computer Aided Campus Area Network Management System. The system consists of software components and a library of about 60 classes. It is divided into three types of subsystems which reside on different servers and communicate.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Rev Your Digital Product Delivery Engine Icon
    Rev Your Digital Product Delivery Engine

    Enterprise-grade platform designed to connect strategy, planning, and execution across digital product development and software delivery

    Planview links your technology vision directly to teams' daily work, providing complete visibility and control over your digital product delivery ecosystem.
    Learn More
  • 5

    Trike

    Computer-aided threat modeling

    Trike is a platform-independent tool for systematic, computer-assisted threat modeling, from requirements through deployment. We are developing Trike v2 on GitHub (https://github.com/octotrike/trike). Our mailing lists are still here on SourceForge, and we're leaving the old code repository & releases up for archival purposes. Plus you probably want to use something while you're waiting for v2.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    A Firefox tutorial add-on for adult absolute beginners, to provide information on and to build up understanding of the threats and features of the web. Suggestions to security plugins, links to web howto's. Includes basic navigation help.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Computer Aided Design of Security Ontology - master thesis realized at GUT
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    An Open Source Computer Aided Dispatch (CAD) system. This project aims to provide Open Source dispatch software that police, fire, and emergency services departments can use to help fully utilize their resources.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB