Share your screen instantly while on a phone call with CrankWheel for an engaging presentation.
For salespeople and customer service agents who want to compliment their phone calls with visual elements.
Our 10x simpler screen sharing tool is designed for you if you spend your days on the phone with clients, and need to add a visual presentation to close sales. No more scheduling a follow-up meeting, or teaching them to use a complex tool. Send them a text message or email, and they see your screen in seconds.
Learn More
More Bookings. Better Experience.
For tour and activity providers
The all-in-one solution built to help you stay organised and get more bookings with thousands of connections to online travel agencies (OTAs), resellers and suppliers.
The Feynman Simulation Framework provides a standard methodology for software engineers to develop simulations in Ruby with the flexibility to develop only the classes that are necessary to solve the physical problem.
Web application to create Dynamicly Graphical-Design/Content web sites. Quick abilities to change graphics, content, design and architecture of web-pages. Every page has ability to contain a forum, posts, galleries and ANY other functionality wished for.
. From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.
DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
CodingDojo to learn, explore, practice and test technologies. Along with CodingKatas there are also challenges. The main purpose of this project is to register and drive software craftsmanship and polyglot programming even further.
Whatzit provides a system for using error and status conditions much more rich than the canonical 'zero means success, anything else is situational' mechanism. You can tell the severity of a condition and where it originated by looking at its value.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
A JavaScript presentation layer framework. It proposes a complete separation of view logic and design. Its components are designed by its role and not by its screen appearance, reducing drastically the API.
Etch is a cross-platform, language- and transport-independent framework for building and consuming network services. With Etch, service development and consumption becomes no more difficult than library development and consumption.
Terrier is a RBAC framework, business oriented and with focus on manageability and access control. Integrating all company tecnhnologies (java, ruby, delphi and others). The owner of a system can manage and delegate manageability to the systems, reducing
reputron is a knowledge extraction engine platform that covers all aspect of text mining, relevance, indexing and querying on a corpus of text documents.