CloudZero automates the collection, allocation, and analysis of your infrastructure and AI spend to uncover waste and improve unit economics.
CloudZero is the leader in proactive cloud cost efficiency. We enable engineers to build cost-efficient software without slowing down innovation. CloudZero's next-generation cloud cost optimization platform automates the collection, allocation, and analysis of cloud costs to uncover savings opportunities and improve unit economics. We are the only platform that enables companies to understand 100% of their operational cloud spend and take an engineering-led approach to optimizing that spend. CloudZero is used by industry leaders worldwide, such as Coinbase, Klaviyo, Miro, Nubank, and Rapid7.
Learn More
Atera IT Autopilot
Ensure operational efficiency at any scale with 24/7 autonomous IT support.
IT Autopilot takes the pressure off your team by handling first-tier support across the channels your end users already live in — email, chat, Slack, Teams, and your Customer Portal. It doesn’t just respond to end-user queries, issues, and crises — it solves them.
A command line utility for common string functions
What to quickly know the length of a string? Convert to upper or lower case? We introduce... strtools. The command line utility that should be included in all operating systems.
A useful wrapper for programming, debugging and scripting.
A C (and JavaScript) library providing predictive text functions. The API is very simple and provides dictionary autocomplete and partial/full matching. Sample cellphone-like examples are included.
This project will provide tools for user to convert existing web sites, blogs and documents with non-standard Myanmar font data to Unicode 5.1 compatible data.
(Zawgyi to Unicode 5.1, WinMyanmar system to Unicode 5.1 etc.)
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.