Showing 2 open source projects for "basic-256"

View related business solutions
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Intelligent Automation Solutions Built for Modern Finance Teams Icon
    Intelligent Automation Solutions Built for Modern Finance Teams

    We do CFO stuff.

    Digitally transform your business with workflow automation and integrated payment solutions. Digitally store and secure your data with advanced search and accessibility features that keeps your documents at the tip of your team’s fingers.
    Learn More
  • 1
    Estimate

    Estimate

    Web based Cost Estimation, Material Takeoff and Reconciliation Tool

    "Estimate" is an Open Source web based Construction Cost Estimating Software designed for medium and large Civil Construction and EPC (Engineering Procurement and Construction) companies. Features include Management of Schedule of Rates, Analysis of Rates, Project Estimation (Definitive and Control), Tender Evaluation, Cost Sheet preparation, BOQ Generation, Audit and Projection. Estimate is suitable for a wide variety of trades and businesses, including but not limited to:...
    Leader badge
    Downloads: 16 This Week
    Last Update:
    See Project
  • 2
    SecSy: Security-oriented Log Synthesis

    SecSy: Security-oriented Log Synthesis

    Tool for synthesizing business process logs.

    SecSy is a tool for security-oriented log synthesis. Besides basic synthesis properties (cases per day, office hours, randomized activity duration, ...), its detailed parameter setting for simulating business processes also allows to specify data usage (objects + access modality), actors for process activities and access control constraints for task/object permissions. It is also capable of enforcing/violating specific security properties on process traces, such as SoD/BoD, Unauthorized Access, Corrupted log entries, Skipped Activities. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next