Showing 2 open source projects for "document search engine"

View related business solutions
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • 1
    Koha + DSpace 9.2 Live DVD ISO (2026.01)

    Koha + DSpace 9.2 Live DVD ISO (2026.01)

    Koha 25.11.00 + DSpace 9.2 Live ISO Installer based on Ubuntu 22.04.5

    Koha + DSpace Live is a Live Bootable and Installer ISO based on Ubuntu 22.04.5 (Koha Version: 25.11.00 and DSpace Version: 9.2) This ISO boots only in Legacy BIOS mode and not in Secure Boot Mode After booting from the Live DVD/USB, use the following login credentials: Login: library (Displayed as 'Open Digital Library') Password: library This Live ISO contains additional Desktop Environments (aka D.E) providing different User Interfaces. If you wish to choose a Lightweight...
    Downloads: 54 This Week
    Last Update:
    See Project
  • 2
    Advanced Persistent Security

    Advanced Persistent Security

    Advanced Persistent Threat Security

    ...The system is designed from a core that avoids the detection of sdhash and Memory analysis Built-in security, allows anonymous browsing by filtering requests external identification, Exit Tor Nodes and using the TOR Fingerprinting structure The system is designed to navigate without being detected or registered by any search engine or online platform denying all types of response to servers, The system will deny the pings, scan nmap and any type of test that is made to the system, Protecting from the core The mechanism of the system will prevent the retrieval of information or any forence attempt by creating a different identity at each beginning of the system and permanently erasing the previous identity with a click on you can hide your activity, delete safely with different modules, each identity is different to avoid the digital forensic analysis. ...
    Leader badge
    Downloads: 10 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next