Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
Build an app in Retool
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
System for market research for improved customer lifecycle management. Boosts acquisition, relationships, and collaboration through role-based access, scheduling, and task management
software for email automation (newsletters, transaction mails, etc.)
This is an archive for old versions of OpenEMM. You will find the latest version of OpenEMM here: https://wiki.openemm.org
OpenEMM is a browser-based enterprise application for email automation like info and marketing newsletters, transaction mails or multi-stage email campaigns.
OpenEMM offers tons of features for professional users, among them: a great user interface, template-based HTML mailings, automatic bounce management, mail opening and link tracking, lots of graphical realtime...
Cyn.in helps teams to build collaborative knowledge by sharing & discussing digital content within secure & unified application. It combines the capabilities of wikis, social network, blogs, files, microblogs, discussions into secure enterprise platform.
An alternative Identification system that is a replacement for Microsoft's Passport and the Liberty Alliance. Its a simple architecture that is setup so anyone can run a server and thereby have control over their online identification.