Cortex makes coding easier and faster for developers. See how our portal connects tools and cuts busywork.
Cortex is a simple portal that helps developers work smarter by linking all your tools, setting clear rules, and slashing repetitive tasks. It speeds up onboarding, updates old code, and fixes issues fast. Over 100 big companies use it to save time and get better results.
Try it now!
Polygon Software | Apparel Software | PLM and ERP Solutions
Small to mid-sized sewn goods manufacturers and textile mills.
PolyPM is an integrated enterprise resource planning (ERP) and product lifecycle management (PLM) solution developed by Polygon Software. Built for small to medium-sized apparel manufacturers, PolyPM enables businesses to integrate all aspects of the product development, supply chain and production processes, as well as instantly access all their style and manufacturing information anywhere in the world. This allows businesses to shorten time-to-market, incur lower development costs, and improve customer service and worker productivity.
YANG (Yet Another Network Generator - Java) enables you to generate social networks given various social rules observed in the real population. Uses: generate realistic networks to be used in individual-centric models, teaching or benchmarking.
siggen is a cool email signature generator for encrypted ansi c (confused), brainf*ck, ... signatures. Use it in combination with vi(m), emacs, mutt, pine, or what ever. (tested on Solaris, Linux and Windoze). Optimized only for geeks :-)
A web-based image generator of MonoMyths. A MonoMyth is a ring shaped chart used by mythologists to show common stages in a myth/legend/story/movie/current story/book/one's psychological development. Written in Javascript and PHP.
Monitoring, Securing, Optimizing 3rd party scripts
For developers looking for a solution to monitor, script, and optimize 3rd party scripts
c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.