Products to help you get data where it needs to go—securely and efficiently.
For too many businesses, complex file transfer needs make it difficult to create, manage and support data flows to and from internal and external systems. Progress® MOVEit® empowers enterprises to take control of their file transfer workflows with solutions that help secure, simplify and centralize data exchanges throughout the organization.
Learn More
The AI coach for teams, built on validated assessments.
Cloverleaf is an assessment-backed AI Coach that fully understands your people and the context of their workday.
Give managers and teams proactive, contextual coaching to lead effectively, communicate clearly, and navigate real work situations as they happen.
Management & operating of AT-based (e.g. Sagem) mobile phones/modems
JYMAG (Jig Your Music And Graphics) is a program for communicating with serial-port-based mobile phones.
It is a free replacement for the Sagem mobile phone software, 'My Pictures and Sounds', and a general-purpose serial terminal.
See the project homepage https://jymag.sourceforge.io and the project Wiki in the menu above.
...The platform supports Windows/MAC/Linux.
Note: Developed with Java17
Follow these steps step by step to apply RxtxConsole,
1. LIST, to obtain all Serial ports currently available on the system.
2. CONNECT, Select a Serialport for connection and place it in the connection pool for use
3. CONNECTED, check that the Serial ports are connected. Sometimes, the Serial ports
that you try to connect may have been used by other applications.
4. ...
Biblioteca para obtenção de peso de itens sobre balanças
PesoLib é uma biblioteca que é capaz de detectar e conectar-se
à uma balança plugada no computador, os pesos podem ser recebidos
sem a necessidade de solicitação, ou seja quando um item for colocado sobre
a balança a biblioteca enviará o peso automaticamente para sua aplicação.
Java SerialPort Terminal allows you to open asynchronous serial COM ports on your computer. For all you Java fans out there, this is an example of how to access a serialport. Produced by BreezeElectronics.Net. Help link is added to Version 1.00
Evertune | Improve Your Brand's Visibility in AI Search
For enterprise marketing teams looking for a platform to understand and influence how AI models like ChatGPT recommend their products or services.
Evertune is the Generative Engine Optimization (GEO) platform that helps brands improve visibility in AI search across ChatGPT, AI Overview, Gemini, Claude and more.
BirdTerm - Bold Inventions Terminal -- A Java-based SerialPort Terminal program like TeraTerm. It implements ANSI sequences for setting text color and cursor position. It uses SWT/JFace and the RXTX Communication API.
XSockets - open, lightweight and highly portable library of universal and eXtensible Super Sockets for point-to-point communication. A unified API for many communication methods between programs and/or devices (e.g. TCP/IP sockets,serial link,pipes,IrDA)
There are different files supplied. One program for webcam controlling inline with the orginal idé. And different help classes if you would like to do something yourself. Also a general package of classes to communicate with the RS232 port.
TJTerm is an open source serialport terminal program written in
Java, running on Linux, Mac OS and Windows. It supports color, logging, macros, graphical hex and/or ASCII input and output and more.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.