For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
Learn More
ACI Learning: Internal Audit, Cybersecurity, and IT Training
Proven skill building for every aspect of your support or IT team.
Traditional training doesn't equip employees with the practical skills they need to drive business success. ACI Learning provides hands-on IT and cybersecurity training designed to build real-world, on-the-job skills. Our outcome-based programs empower employees with certification prep, industry-recognized credentials, and flexible learning options. With expert-led video training, labs, and scalable solutions, we help businesses, individuals, governments, and academic institutions develop a skilled workforce, align with business goals, and stay ahead in a rapidly evolving digital world.
Many thermodynamic, fluidmechanic etc calculations need special informations about the used material ( resistance against heat for example). This values will be collected in a databasesystem. The calculation will be done on an appserver.
Mimah is a code generator for O/R mapping tool.
The open architecture enables Mimah to support any tool, any language, any database.
Supported : MLF, C#, Vb.net, SQL Server 2000, Oracle & MsAccess
DataHub is the leading open-source data catalog helping teams discover, understand, and govern their data assets.
Modern Data Catalog and Metadata Platform
Built on an open source foundation with a thriving community of 13,000+ members, DataHub gives you unmatched flexibility to customize and extend without vendor lock-in. DataHub Cloud is a modern metadata platform with REST and GraphQL APIs that optimize performance for complex queries, essential for AI-ready data management and ML lifecycle support.
S.O.D.A. is a an object API to communicate with databases.
The current specification is focussed on queries.
Goals are: type safety, object reuse, minimum string use, programming language independance.
NLucene is the .NET implementation of the Lucene high-performance, full-featured text search engine written in Java. See http://jakarta.apache.org/lucene for more info on Lucene.
Types: -Meeting with Clients -CAD dispatch -Worflow -SOA and inter network workflow -Interprocess communication -Batch jobs -Large scale integration -Manufacturing System and Systems -Personal -Employee -Project -Robot / Robots / Robotic
Pure XML database accesible by SQL. Library to access specific formatted XML files like a standard Relational Database. No separate database server engine.
A database refactoring framework to easily keep track of database changes. DBMS independent. All changes are kept in XML Files.
Runs on all platforms supported by Microsoft.Net and Novell's mono.
LiquiBase.Net is a port of the java based LiquiBase
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can: