Stratosphere’s cutting edge cloud platform gives estimators unprecedented freedom to complete takeoffs from anywhere with next generation takeoff and markup tools.
Learn More
RouteGenie NEMT software
Modern software for non-emergency medical transportation providers, built to improve scheduling, billing, routing, and dispatching processes.
RouteGenie NEMT software is a modern system built to automate all non-emergency medical transportation processes including routing, scheduling, dispatching, and billing. It helps manage everyday challenges like vehicle breakdowns, traffic problems, cancelations, driver call-offs, will calls, no shows, add-on trips, on-demand trips, and more.
Porcupine is an open-source Python based web application server that provides front-end and back-end revolutionary technologies for building modern data-centric Web 2.0 applications.
Develop: domain secure, and performing secure Domain Name System (DNS) dynamic updates. Domain Name System Security Extensions
Servlet API Package
The javax.servlet.http package contains a number of classes and interfaces that describe and define the contracts between a servlet class running under the HTTP protocol and the runtime environment provided for an instance of such a class by a conforming servlet container.
Porcupine is an open-source Python based web application server that provides front-end and back-end revolutionary technologies for building modern data-centric Web 2.0 applications.
CAjax is a library for building AJAX style web applications, which consists of a javascript package for easy writing object-oriented AJAX logic in javascript, and a set of server-side packages dealing with unified communication details.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
A healthy alternative to ASP, PHP, ColdFusion, JSP, for html templating and dynamic server generated web pages. Currently used as the foundation for BlogPutty, a weblogger.