You Might Also Like
Build Securely on Azure with Proven Frameworks Icon
Build Securely on Azure with Proven Frameworks

Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Red Hat Ansible Automation Platform on Microsoft Azure Icon
Red Hat Ansible Automation Platform on Microsoft Azure

Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
AI-based, Comprehensive Service Management for Businesses and IT Providers Icon
AI-based, Comprehensive Service Management for Businesses and IT Providers

Modular solutions for change management, asset management and more

ChangeGear provides IT staff with the functions required to manage everything from ticketing to incident, change and asset management and more. ChangeGear includes a virtual agent, self-service portals and AI-based features to support analyst and end user productivity.
Case Management Software for Social Services Icon
Case Management Software for Social Services

For human services organizations looking for case management software

Collaborate is customizable case management software for non-profits and social services agencies with teams of 5+ staff.
The Secure Workspace for Remote Work Icon
The Secure Workspace for Remote Work

Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.

Additional Details for WDialog framework for web applications

Operating Systems

Linux, BSD

Intended Audience

Developers

User Interface

Web-based

Programming Language

Perl, OCaml (Objective Caml)

Registered

2002-02-11

Last Updated

Categories

CGI Scripts

Maintainers

jschrod, stolpmann

Keep Me Updated!