Streamline your legal processes and ensure compliance with our eDiscovery company.
DWR eDiscovery allows legal professionals to process, analyze, review, and produce documents that are relevant to litigation and other legal disclosure obligations. Our tools allow easy ingestion and analysis of client and opposing party documents using a comprehensive set of document review features including AI search, keyword search, keyword highlighting, metadata filtering, marking documents, privilege log management, redactions, and a range of analysis tools to help users best understand their document corpus.
Learn More
Build innovative business apps powered by process automation
Connect workflows, teams and systems within one digital business transformation platform
Manage your business as a unified system of interacting processes. Use BPMN 2.0 for low-code process modeling by business people. Follow your strategic goals with process architecture that always corresponds to the structure of an actual business.
W.H.A.T. is an analytic tool for Wikipedia with two main functionalities: an article network and extensive statistics. It contains a visualization of the article networks and a powerful interface to analyze the behavior of authors.
Analysis and interactive visualization of a web-based community. Supports different focuses on the given social network to present community groups to the user. Also specific information of each member is provided.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
CRML - Conflict Resolution Markup Language - http://www.equiforum.org - is an open source innitiative to develop an XML based Semantic Web ontology (RDF, OWL) for researchers interested in peace to create a standard way of collecting and sharing informa
Target is develop import and export filter for various data base systems from and to GEDCOM and GedXML (the XML specification of GEDCOM).
The GEDCOM data format is prepared by "The Church of Jesus Christ of Latter-day Saints" (also known as Mormone)
Provide geneology information, contact information, personal descriptions and webpages, calendars, etc in a web interface. This system will use php and any database system and will provide various level of public and private access.
Multi-cloud security delivered — now and in the future.
Designed for organizations operating in the cloud who need complete, centralized visibility of their entire cloud estate and want more time and resources dedicated to remediating the actual risks that matter, Orca Security is an agentless cloud Security Platform that provides security teams with 100% coverage their entire cloud environment.