UnForm is ideal for businesses focusing on distribution, manufacturing ERP solutions, and general accounting.
UnForm® is a platform-independent software product that creates, delivers, stores and retrieves graphically enhanced documents from ERP application printing. A complete, end-to-end document management solution, UnForm interfaces at the point of printing to produce documents in various formats for printing and electronic delivery.
Learn More
Jesta I.S. | Enterprise Software For Retail and Supply Chain
Transition from fragmented entry-level or legacy systems to an enterprise suite.
Unify your people and operations across all departments and channels. Discover end-to-end retail, wholesale, and supply chain management software suites designed to scale.
A multi-threaded, multi-database tcp-based database insertion app.
DBD2 inserts database records from TCP input. It is a companion project to Syslgod2 and an application in its own right.
It ships with a backgrounding client for generic use. The client sends whatever information the user puts on the command-line to the back-end daemon via TCP. Upon successful transmission, the client exits. On failure, it backs off and retries until its life-time timer expires.
The back-end daemon accepts data from Syslogd2 or its own client and inserts that data...
Reads a PostgreSQL database log file, extracts the SQL statements and executes them in the same order and timing against another database server. Useful for performance tests with real-world workload.
Ingres Dynamic Playback is a tool to play back prerecorded SQL statements to do functional and stress testing on the Ingres Database. More information here: http://community.ingres.com/wiki/Dynamic_Playback
Quant offers a wide range of solutions for retail. Within one integrated software system, it allows you to efficiently combine the management of retail space, shelf labels and marketing materials with task management, reporting and automatic replenishment.
SpaceMonkey is a Web application auditing tool. It can detect bugs or security flaws without using a knowledge database. It uses fault injection technics ('fuzzing') in order to reveal the flaws (SQL injection, XSS, File inclusion, command execution ).