Bring compliance and operations under one roof with an AI agent that automates workflows, policies that enforce rules, and a platform that delivers results.
Learn More
Cloudbrink Personal SASE service
For companies looking for low maintenance, secure, high performance connectivity for hybrid and remote workers
Cloudbrink’s Personal SASE is a high-performance connectivity and security service that delivers a lightning-fast, in-office experience to the modern hybrid workforce anywhere. Combining high-performance ZTNA with Automated Moving Target Defense (AMTD), and Personal SD-WAN all connections are ultra-secure.
Artificial Intelligence techniques applied to common software tasks, using First Order Logic; N3, OWL ontologies and rules. Enables component-based application building, platform independence, user-friendliness. Leverage on Euler inference engine + GUI.
N.B. THE PROJECT HAS BEEN MOVED TO GITHUB
https://github.com/jiprolog/
JIProlog is a cross-platform pure Java 100% Prolog interpreter that integrates Prolog and Java languages in a very fashinating way.
JIProlog is compliant with the major Prolog interpreters. It supports most of ISO Prolog specifications and the most common and used built-in predicates,
JIProlog allows to call Prolog predicates from Java without dealing with native code (JNI or JNA) and allows to invoke Java...
JinnIde is a plugin that allows using Jinni Prolog, now also hosted here on this site (with open source license!), within the confines of an IDE integrated in JEdit.
Component (library, framework) refactoring may affect existing applications, where the client code used previous component versions. Our tool preserves applications binary-compatible by generating an adaptation layer out of change history.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
8. Mai 2005: We have discontinued SourceForge as a download place for our open source projects. You can now download these projects directly from the XLOG Technologies GmbH web site at http://www.xlog.ch/omonia.