Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
Financial reporting cloud-based software.
For companies looking to automate their consolidation and financial statement function
The software is cloud based and automates complexities around consolidating and reporting for groups with multiple year ends, currencies and ERP systems with a slice and dice approach to reporting. While retaining the structure, control and validation needed in a financial reporting tool, we’ve managed to keep things flexible.
Ajax Portal (WebOS & Enterprise Portal). Ajax Portal is open source cross-platform cross-browser Web 2.0 / Web 3.0 solution which is based on a new architecture of WebOS and Enterprise Portals. Our Enterprise Portal can work as Mashup (WOA approach). The portal provides Portlet/Portal API, Services. It's posible to use the Decoration module of the portal as a part of the standard Web application (Web 2.0 / Web 3.0 application). Open Source allows you to try and evaluate our Web 2.0 /...
The Physical Security Interoperability Alliance (PSIA) was founded to promote the interoperability of IP enabled security devices and systems using freely available protocols and standards such as HTTP, HTTPS, XML, RTP, RTSP, zeroconf, etc.
Front End for a generic CyberOPC Server based on the free CyberOPCServerLibrary. It is free opensource a kepware-like interface using a server generated with the CyberOPCServerLibrary. (www.cyberopc.org)
Enterprises and companies seeking a solution to manage all their procurement operations and processes
eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
"Plug-in" for MythTV that allows streaming video from popular websites such as Hulu available for viewing through the standard MythVideo interface. For detailed setup instructions, please visit: http://lynx44.wordpress.com/hulu-plug-in-for-mythtv/
WinS3fs is a filesystem for Windows allowing access to Amazon S3 Storage. It implements a local virtual SMB server \\s3 to allow access to Amazon S3 buckets
Framework for supporting reliable, secure E-Business using open standards. Including components for web service calls, non-repudiation, UDDI-registries and a standardized subset of the UBL 2.0 business document profile. Supported for .Net and java.
Software originally realised by the Grid research project Akogrimo (http:/www.mobilegrids.org) working on integrating network capabilities with Grid Middleware. Selected topics are Context Management, SIP/SOAP integration, Semantic workflows, ...
IMS is for field agents collecting artifacts related to a claim by allowing Windows Mobile 6 users to gather notes, recorded interviews and photos taken with the device’s camera, and assign them to incidents stored in a DFS-enabled Documentum repositor
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.