Multi-cloud security delivered — now and in the future.
Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment.
Learn More
Office Ally: Healthcare Software for Your Medical Practice
We support healthcare organizations of all sizes with easy-to-use, affordable software solutions.
Service Center by Office Ally is a trusted revenue cycle management platform used by over 65,000 healthcare organizations processing more than 350 million claims annually. With it, providers can verify patient eligibility and benefits, upload and submit claims, correct rejected claims, check claim status, and obtain remits. With multiple claim types and submission options, providers can easily submit claims to any payer from any practice management system. Transactions are secure, ensuring the confidentiality of sensitive patient information. With no needed implementation, providers can quickly and effortlessly streamline their billing processes, increase their financial performance, simplify medical billing, and reduce claim rejections for faster reimbursements.
Mobile Device Detection for Java - 4 Step Setup - 3 minutes
Add mobile device detection to Java the easy way with 51Degrees.com. No cloud services, no external plug-ins, all Mozilla Public Licence sourcecode. It's a great alternative to WURFL or DeviceAtlas.
Also available on Maven.
1) Download the zip and extract.
2) Add the core JAR located in the "dist" directory to your java project.
3) Import the following packages:
import fiftyone.mobile.detection.Match;
import fiftyone.mobile.detection.Provider;
import fiftyone.mobile.detection.factories.StreamFactory;
4) Use the following code to start detecting devices:
//The Lite data file is provided with every archive.
...
Dunbar is a location-based chat tool for mobile devices and phones as well as desktop computers. The architecture is built on web services so that clients on any operating system can be created. The service will be free to users, and the sourcecode will
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Framework for Java code generation of web applications is for the above framework mentawai, done to expedite the process of creating a project in Java technologies with the JPA, Hibernate, Mentawai, AJAX with DWR among others.