Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
Explore 10,000+ tools
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
The melody manager is a web application which indexes music and makes it accessible over the internet. Music is organised into artists, albums and playlists. Eventually the system will expand the users music collection based on their likes and dislikes.
CDM (CD Manager) is a database (based on Oracle-database!!) for Audio-CDs. Information can be imported or exported in several formats including CDPLAYER.INI, CDDB.DAT or freedb. It also includes a small CD Player.
KmusicdB is a music information manager for KDE3 and a PostgreSQL database. You can add your music collection and browse through it in a customizable viewer. KmusicdB includes CDDB support, reports and searching. This is not an MP3 manager.
AI-Powered Security and IT Operations Without Compromise.
Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
Automated Attendance System (AAS) uses 2 modes for authentication -
* Voice Identification System (VIS)
* Fingerprinting Method
The algorithms used for the same has been developed by me. This algo is more efficient and faster.
A PHP and MySQL based band managment system and CMS to assist bands in organising gigs, releasing albums, and producing websites with current news and forums. Go to www.filibusta.net to see capabilities.
<h3>SpeaR</h3><b>SpeakingRoomplan</b>
<p>
SpeaR, der sprechende Raumplan, liest Ereignisse aus eine DB aus
und gibt entsprechende Meldungen in verschiedenen Räumen aus.</P>
<br>DB <--JDBC--> Server <--JINI--> SpeakingClients