Showing 13 open source projects for "computer aided dispatch"

View related business solutions
  • A privacy-first API that predicts global consumer preferences Icon
    A privacy-first API that predicts global consumer preferences

    Qloo AI adds value to a wide range of Fortune 500 companies in the media, technology, CPG, hospitality, and automotive sectors.

    Through our API, we provide contextualized personalization and insights based on a deep understanding of consumer behavior and more than 575 million people, places, and things.
    Learn More
  • Diagnose and Resolve IT Issues in Real Time Icon
    Diagnose and Resolve IT Issues in Real Time

    Engage your employees and agents more efficiently with ScreenMeet as a seamless extension of your existing IT Service Delivery Platform.

    ScreenMeet’s unique combination of video calling, screen share, and remote desktop functionality lets you quickly diagnose hardware and software issues with no frustration.
    Learn More
  • 1
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    The architecture of the system is integrated by different Fingerprinting mechanisms. The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The...
    Leader badge
    Downloads: 12 This Week
    Last Update:
    See Project
  • 2

    Iris Recognition System

    Iris Recognition System Matlab source code

    Biometrics is one of the most important and reliable methods for computer-aided personal identification. It has a wide range of applications, in government programs such as national ID cards, use in visas and visa processing, and in the war against terrorism, as well as having personal applications in areas such as logical and physical access control. Iris recognition is the most accurate personal identification biometric and it is this that accounts for its use in identity management in government departments requiring high security. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    ODS3 Virtual Machine Challenge

    ODS3 Virtual Machine Challenge

    Virtual Machine Image To Test Penetration Skills

    The ODS3 Virtual Machine Challenge are downloadable images that can be run as VMWare or VirtualBox instances. The Idea behind the challenge is to test and exercise web application penetration testing in a controlled environment. These images are great for cyber security students, penetration testers and hobbyist. Care should be taken if installed on an Internet access host as the application are purposely vulnerable to attack and exploitation.
    Downloads: 15 This Week
    Last Update:
    See Project
  • 4
    CACANMS is an acronym for Computer Aided Campus Area Network Management System. The system consists of software components and a library of about 60 classes. It is divided into three types of subsystems which reside on different servers and communicate.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Arryved POS System Icon
    Arryved POS System

    Drive contagious loyalty with your guests and staff with a POS and Brewery Management system that helps run your craft brewery better.

    Arryved was built to help craft beverage makers thrive.
    Learn More
  • 5

    Trike

    Computer-aided threat modeling

    Trike is a platform-independent tool for systematic, computer-assisted threat modeling, from requirements through deployment. We are developing Trike v2 on GitHub (https://github.com/octotrike/trike). Our mailing lists are still here on SourceForge, and we're leaving the old code repository & releases up for archival purposes. Plus you probably want to use something while you're waiting for v2.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    A Firefox tutorial add-on for adult absolute beginners, to provide information on and to build up understanding of the threats and features of the web. Suggestions to security plugins, links to web howto's. Includes basic navigation help.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Computer Aided Design of Security Ontology - master thesis realized at GUT
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    MSLK provides the precompiled Win32 binaries of some excellent porject with a GPL or similar open source license. Here will keep updated.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Cnc's IP Data Volume Report

    Logs IP to IP contact, number of packets, bytes.

    Cnc's IP Data Volume Report: Logs IP to IP contact, number of packets, bytes, time of contact, Ethernet too! View via local web interface. Very simple for those who want to view who your computer is contacting the most!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build innovative business apps powered by process automation Icon
    Build innovative business apps powered by process automation

    Connect workflows, teams and systems within one digital business transformation platform

    Manage your business as a unified system of interacting processes. Use BPMN 2.0 for low-code process modeling by business people. Follow your strategic goals with process architecture that always corresponds to the structure of an actual business.
    Learn More
  • 10
    DelFileLock is a Win32-only Software and tries to delete or only unlock a file, which is still used and locked by another process. Normal deletes do not work, because of window's generated filesystem-errors.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    An Open Source Computer Aided Dispatch (CAD) system. This project aims to provide Open Source dispatch software that police, fire, and emergency services departments can use to help fully utilize their resources.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Features of Cyberarmy.com brought direct to your desktop. They don't want it, so this projects kinda dead, wish I hadn't started it so early haha. Any ideas for an alternate purpose (not an IM client): jwinsatt@adelphia.net
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    A Secure, Firewall-Friendly Platform for Peer-to-Peer Networking. With a few mouse clicks, request remote access to colleagues' computer desktops, transfer files, sketch & chat, or videoconference. Automatic, authenticated & encrypted tunneling!
    Downloads: 13 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB