Enterprise-grade platform designed to connect strategy, planning, and execution across digital product development and software delivery
Planview links your technology vision directly to teams' daily work, providing complete visibility and control over your digital product delivery ecosystem.
Learn More
GoAnywhere Managed File Transfer (MFT)
Secure and simplify your file transfers
GoAnywhere MFT provides secure managed file transfer for enterprises. Deployable on-premise, in the cloud, or in hybrid environments, GoAnywhere MFT software enables organizations to exchange data among employees, customers, and trading partners, as well as between systems, securely. GoAnywhere MFT was a recipient of the Cybersecurity Excellence Award for Secure File Transfer.
OpenBot leverages smartphones as brains for low-cost robots
...Current robots are either expensive or make significant compromises on sensory richness, computational power, and communication capabilities. We propose to leverage smartphones to equip robots with extensive sensor suites, powerful computational abilities, state-of-the-art communication channels, and access to a thriving software ecosystem. We design a small electric vehicle that costs $50 and serves as a robot body for standard Android smartphones. We develop a software stack that allows smartphones to use this body for mobile operation and demonstrate that the system is sufficiently powerful to support advanced robotics workloads such as person following and real-time autonomous navigation.
Step-by-step instructions for making your HVAC (Heating, Ventilation & Air Conditioning) system state-of-art. Covers airflow balancing, temperature control & zoning, energy conservation measures, remote access, 1-wire, XBee devices, home automation
...In addition you can share unlimited mp3s and mp4s with your friends. MyZone does not downgrade the resolution of your photos and all established connections are encrypted using state of the art encryption techniques. MyZone is designed to be resilient towards cyber attacks especially DDoS attacks and government imposed censorships. MyZone should be an interesting social networking platform for users who are more concerned with the privacy of their profile information.
Chrome Enterprise brings enterprise controls and easy integrations to the browser users already know and love.
Chrome Enterprise is ideal for businesses of all sizes, IT professionals, and organizations looking for a secure, scalable, and easily managed browser solution that supports remote work, data protection, and streamlined enterprise operations.
MLDonkey G2gui is a next-generation crossplatform Graphical User Interface to the MLDonkey core. Its goal is to be userfriendly and powerful, using state of the art Java-techniques like SWT and other parts of the eclipse framework.
REST-art is an open-source (LGPL) Web Services library. It helps develop RESTful Web Services. It is designed to be simple and tiny. It may replace huge SOAP frameworks in your developments. REST-art uses URIs, XML and REST / HTTP verbs (GET, POST, PUT,
The Digital Archive for Architecture (DAArch) is a project at The Art Institute of Chicago. The system is structured around the use of Categories for the Description of Works of Art (CDWA) metadata schema, and its underlying digital repository DSpace.
This software schedules the shutdown and startup of networked NEC LT280 Projectors. This saves lamp life and electricity usage. It was written for the Art Institute of Charleston's computer labs and smart classrooms.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.