Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
Learn More
Corporate Compliance Software | Skillcast
Trusted by 1,400+ companies to simplify compliance
Skillcast delivers compliance training and RegTech through a unified Compliance Portal that brings e-learning, Policy Hub (versioning & attestations), staff declarations, compliance registers, CPD/Training 360 and Events Management in one place.
The AJAX JSP Tag Library is a set of JSP tags that simplify the use of Asynchronous JavaScript and XML (AJAX) technology in JavaServer Pages. Development moved to Mercurial
phpAjaxTags is a port to PHP from advanced java tag library "AjaxTags" (ajaxtags.sourceforge.net). To install - just extract zip file into Your root www dir. On-line demo http://www.2al.pl/phpAjaxTags/
SG is an another next generation code generator which generates web-based java applications with Apache Cayenne RDBMS, Apache Struts 1.1, Displaytag 1.1 , AjaxTags support. It uses an excel user interface to gather beans and application data.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.