Rezku is an all-inclusive ordering platform and management solution for all types of restaurant and bar concepts. You can now get a fully custom branded downloadable smartphone ordering app for your restaurant exclusively from Rezku.
Learn More
Workable Hiring Software - Hire The Best People, Fast
Find the best candidates with the best recruitment software
Workable is the preferred software for today's recruiting industry and HR teams, trusted by over 6,000 companies to streamline their hiring processes. Finding the right person for the job has never been easier—users now possess the ability to manage multiple hiring pipelines at once, from posting a job to sourcing candidates. Workable is also seamlessly integrated between desktop and mobile, allowing admins full control and flexibility all in the ATS without needing additional software.
MARF is a general cross-platform framework with a collection of algorithms for audio (voice, speech, and sound) and natural language text analysis and recognition along with sample applications (identification, NLP, etc.) of its use, implemented in Java.
RUNES is a cross-platform, component-based middleware framework allowing for dynamic reconfiguration of functionality. Its lightweight implementation spans powerful nodes like PDAs and PCs, as well as tiny embedded devices.
JetClass, Java net-class application, allows virtual lectures to be held by teachers and students located in front of their computers, somewhere around the globe. It's written in Pure Java, relying on CORBA for network communications.
The objective of this work is to use key concepts and mechanisms related with the software components approach. Installation, execution and dynamic reconfiguration of a distributed chat application using CORBA are considered.
Monitoring, Securing, Optimizing 3rd party scripts
For developers looking for a solution to monitor, script, and optimize 3rd party scripts
c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.