Unified cloud-based platform for dialing, emailing, appointment scheduling, lead management and much more.
Adversus is an outbound dialing solution that helps you streamline your call strategies, automate manual processes, and provide valuable insights to improve your outbound workflows and efficiency.
Learn More
Network Management Software and Tools for Businesses and Organizations | Auvik Networks
Mapping, inventory, config backup, and more.
Reduce IT headaches and save time with a proven solution for automated network discovery, documentation, and performance monitoring. Choose Auvik because you'll see value in minutes, and stay with us to improve your IT for years to come.
An encryption/decryption engine which can encrypt any file(text, pdf , doc, rtf , gpg , mp3 , mp4 etc..) or any data on your PC such that only you with the valid password can decrypt it.Also it will compress the file while encrypting it.
This project is aimed at extracting keywords from documents either as files or on the Internet. It applies sophisticated keyword ranking algorithm to extract most relevant keywords for a document and has also the capability of finding similar document in
This is an algorithm to codify Spanish words to an equivalent phonetic code. That intends to be a substitute of Soundex algorithm that is not practical to use in Spanish. It is very useful for search engines based on text information.
Iris Powered By Generali - Iris puts your customer in control of their identity.
Increase customer and employee retention by offering Onwatch identity protection today.
Iris Identity Protection API sends identity monitoring and alerts data into your existing digital environment – an ideal solution for businesses that are looking to offer their customers identity protection services without having to build a new product or app from scratch.
The Security Annotation Framework (SAF) is an instance-level access control framework and field-level encryption framework driven by Java 5 annotations.
This program serves to keep track of different types of accounts (technically an infinity number of different types). Currently only bank and equity accounts are supported. Data is saved on the user's computer and encrypted using the DES-algorithm.
A disk based production quality RTree based upon Guttmans quadratic split algorithm having following features:
Buffering with dirty write,
Index joins,
Tree Seeding,
Window and NN queries,
Runtime STR Packing capability,
Completely Thread safe.
HelloWorld is a decentralized social network based on OpenID, P2P and different JAVAencryption technologies. It will offer all the fundamental functionalities of a social network platform respecting the right of informational self-determination.
Plan smart spaces, connect teams, manage assets, and get insights with the leading AI-powered operating system for the built world.
By combining AI workflows, predictive intelligence, and automated insights, OfficeSpace gives leaders a complete view of how their spaces are used and how people work. Facilities, IT, HR, and Real Estate teams use OfficeSpace to optimize space utilization, enhance employee experience, and reduce portfolio costs with precision.
NetBeans, pure Java. The Cryppie can protect your files by encrypting its content, possibility to compress files before encryption. It's destination for keep information in safe on your flash drive or another storage.
The project will develop an in – memory object cache utilizing the LRU (least-recently-used) algorithm. The cache will store the objects that are most accessed within a fixed size memory pool. Thus system is keep statistics and calculates tradeoffs.
MC2 Java Multicast Chat is a serverless p2p chat based on multicast datagrams. Very useful if you want to quickly have a chat session in a Lan without having to do annoying setups. Supports file sharing / sending,multiple channel chat and data encryption
Processes boolean functions which can be provided either as a list of 0s and 1s or which can be provided as a formula in first-order logic (using disjunctive or conjunctive normal forms). Internally the Quine McCluskey algorithm is used.
Primarily applied in experimental psychology, where it is used to create experiment schedules. It even can be applied to other planning-activities that have to met boundary constraints. Rando uses a genetic-algorithm to construct a fulfilled schedule.
jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
This is an academic project; the main objective is to generate an algorithm to parallelize a CNF formula and then feed the distributed parts to sequential SAT solvers, for this project we have choose to use Sat4J as the solver.
TrueSimpleCrypt is a Linux GUI for TrueCrypt, an open-source on-the-fly disk encryption software. Targeting the end-user, TrueSimpleCrypt's aim is to offer essential, everyday features in an intuitive graphical user interface.
RoxGT its an open source framework for building Graph-based applications. It has been built essentially for academic jobs, such as graph algorithm execution and theorem proofs.
This educational software simulates an Ad-hoc network with AODV algorithm, it uses a high level view and only works in Routing layer. it has a user-friendly graphical user interface and has been written in java language.
A hierarchical representation language for music, which can be used as a human algorithmic composition tool or as a semi-automated composition tool using a genetic algorithm with human listeners as the fitness function.
TACS (Trust Ant Colony System) is a Trust model for P2P, Ad-hoc and Wireless Sensor networks (also valid for multi-agent systems) based on the bio-inspired algorithm ACS (Ant Colony System).