Professional Streaming and Video Hosting - GDPR Compliant - 3Q
Secure hosting, scalable streaming, and easy integration for internal and external communications
3Q offers a multifunctional video platform for hosting, managing and distributing video and audio content on all channels. Live and on-demand.
Learn More
All-in-one solution to control corporate spending
Issuance in seconds. Full spending control. Perfect for media buying.
Wallester Business is a leading world-class solution to optimize your company’s financial processes! Issuing virtual and physical corporate expense cards with an IBAN account, expense monitoring, limit regulation, convenient accounting, subscription control — manage your finance on all-in-one platform in real time! Wallester Business benefits your business growth!
It is an Open-Source project that acquire the word spoken and open the its page in Wikipedia.
It include a VoR Engine ~ Voice Recognition Engine make by CMU Sphinx tools.
A duration high-order hidden Markov model (DHO-HMM) in Java.
This project provides an implementation of duration high-order hidden Markov model (DHO-HMM) in Java. It is compactible with JDK 5 & 6. It was used in the author's research on speech recognition of Mandarin digits. There are some Chinese words in this project and I am afraid that I don't have enough time to translate to English recently.
This project is being developed to be a Java based speech recognition (SR) program. In addition to the SR program itself, it includes a program which allows a user to view the sound being received by the computer. The user can manipulate this data.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.