This is a base which stores knowledge in the form of nested sets
...Each server can create and access the unlimited knowledge bases and databases associated with other servers located on the Internet or Intranet. Knowledge bases managed by artificial intelligence language, such as executable code can be written as in external files and in the elements of the base. The KnowledgeBase is powerful enough, it can be used for indexing web contents.
Web application to make user-friendly requests on large XML database.
Tools to XML-ize large bodies of semi-formal texts (like floras).
Computer-assisted specimen identification.
Uses natural language processing, 2D/3D images analysis and generation.
Wikipedia Concept Association Map (WCAM) is new approach for textual knowledge representation and understanding. All concepts and associations are stored in a graph database for better performance and easy distribution.
A Java / Swing Port of the OpenIT Project -- "An Inventory, HelpDesk, Support, Issue Tracking, and KnowledgeBase web application. Focuses on simplicity and ease of customization." -- See http://sourceforge.net/projects/openit for more details.
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Modular Eclipse RCP application to store personal Information like Contacts, Passwords, Notes, ... Initially What? is not intended to share information over a network, but to keep all information in an in-memory-database.
Xenei.Demitrius will be a complete knowledgebase application system. The client will contain a local database and may connect to one or more Demitrius servers. Servers are implemented in Java as Xenei.ImagoX Extensions. Security is role-based.