Showing 4 open source projects for "unity source code"

View related business solutions
  • The Secure Workspace for Remote Work Icon
    The Secure Workspace for Remote Work

    Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

    Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
  • Business Continuity Solutions | ConnectWise BCDR Icon
    Business Continuity Solutions | ConnectWise BCDR

    Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

    Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
  • 1
    SmartSlog (Smart Space Ontology) is a software/application development kit (SDK or ADK) for programming Smart-M3 agents (Knowledge Processors, KPs) that consume/produce smart space content according with its high-level ontological representation. SmartSlog applies the code generation approach: given an OWL ontology description, the ontology programming library is produced. The latter provides API to access the smart space via a Smart-M3 Semantic Information Broker (SIB) and data structures...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    earmark
    *** IMPORTANT NOTICE *** The source code of the earliest version of the EARMARK Data Structure is now available at http://www.github.com/essepuntato/EarmarkDataStructure Even if the SourceForge repository is still active, it concerns old versions of the API and it is not maintained anymore. *** SERVICE DESCRIPTION *** Extremely Annotational RDF Markup (EARMARK) is an ontological approach to the specification of markup structures on text content. It allows not only documents with single...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    *** IMPORTANT NOTICE *** The source code of the earliest version of LODE is now available at http://www.github.com/essepuntato/LODE Even if the SourceForge repository is still active, it concerns old versions of the tool and it is not maintained anymore. *** SERVICE DESCRIPTION *** LODE is a service that extracts axioms and annotations from an OWL ontology, and renders them as ordered lists, together with their textual definitions, in a human-readable HTML page designed for browsing...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    OWL2XMI is a java project to facilitate the creation of classes UML diagrams. It generates a XMI file from one ontology, this XMI file can be imported using UML tools such as: StarUML, ArgoUML, among others. There are available online version, Visit Proj
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • Previous
  • You're on page 1
  • Next