Business Software for Java - Page 22

Top Software that integrates with Java as of December 2025 - Page 22

Java Clear Filters
  • 1
    Editor.do

    Editor.do

    Editor.do

    Editor.do is an all-in-one online IDE and hosting platform that allows you to create, code, host and deploy stunning & fast static websites in seconds. You can easily deploy your site files or a zip containing all your project files to our NVMe SSD storage servers, ensuring the fastest possible loading speed for your site. Our IDE supports over 150 programming languages with real-time code rendering and a panel of shortcuts and tools to search, replace, cut, select, and quickly manipulate your code. Editor.do offers over 1000 free and open-source templates covering a wide range of categories and libraries that can be imported directly from GitHub. Plus, ChatGPT is integrated and is always close at hand to help you correct, complete, or improve your code or text. Editor.do is an ideal platform for developers and designers of all skill levels who want to create stunning, fast, and secure websites in a fraction of the time.
    Starting Price: $3 per month
  • 2
    SpotBugs

    SpotBugs

    SpotBugs

    It is free software, distributed under the terms of the GNU Lesser General Public License. SpotBugs is a fork of FindBugs (which is now an abandoned project), carrying on from the point where it left off with the support of its community. Please check the official manual for details. SpotBugs requires JRE (or JDK) 1.8.0 or later to run. However, it can analyze programs compiled for any version of Java, from 1.0 to 1.9. SpotBugs checks for more than 400 bug patterns.
  • 3
    PMD

    PMD

    PMD

    PMD is a source code analyzer. It finds common programming flaws like unused variables, empty catch blocks, unnecessary object creation, and so forth.
  • 4
    StableCode

    StableCode

    Stability AI

    StableCode offers a unique way for developers to become more efficient by using three different models to help in their coding. The base model was first trained on a diverse set of programming languages from the stack-dataset (v1.2) from BigCode and then trained further with popular languages like Python, Go, Java, Javascript, C, markdown and C++. In total, we trained our models on 560B tokens of code on our HPC cluster. After the base model had been established, the instruction model was then tuned for specific use cases to help solve complex programming tasks. ~120,000 code instruction/response pairs in Alpaca format were trained on the base model to achieve this result. StableCode is the ideal building block for those wanting to learn more about coding, and the long-context window model is the perfect assistant to ensure single and multiple-line autocomplete suggestions are available for the user. This model is built to handle a lot more code at once.
  • 5
    ExoCoding

    ExoCoding

    ExoCoding

    ExoCoding is a code generation online platform that empowers software developers to build better software faster. It uses model-based AI-powered assistants to generate boilerplate code and streamline repetitive tasks. Developers can create apps containing modules with Database Management, Logic Building, and Interface Design. There are also more features like sharing prototypes, task planning, and a marketplace with pre-built templates that enhance the developer’s experience. After generating code (backend and frontend), everything is business as usual with the same IDE and other dev tools, but with much work already accomplished.
  • 6
    Teku

    Teku

    Consensys

    Teku is the Ethereum 2.0 client empowering businesses to stake on the next evolution of the Ethereum network. Written in Java and maintained by the same team behind Besu, Teku is equipped to bring staking services to businesses. Consensys Staking enables institutions to capitalize on the revenue opportunity of Ethereum 2.0 without the technical and operational complexities of running an independent validator. External key management for compatibility with enterprise-grade key stores. Built by the team behind Hyperledger Besu, the leading Ethereum client for enterprises. Detailed documentation to help users get started immediately. Metrics and logging for improved functionality and usability. Commercial support for teams upon request. In order to register as a validator on the network, a user must generate Ethereum 2.0 keys by making a one-way deposit of ETH into the official deposit contract.
  • 7
    Everyware Software Framework (ESF)
    Everyware Software Framework (ESF) is an enterprise-ready IoT framework distributed and supported by Eurotech. Based on Eclipse Kura, the open source Java/OSGi middleware for IoT gateways, ESF adds provisioning, advanced security, remote access, and diagnostics monitoring. It supports ready-to-use field protocols (including Modbus, OPC-UA, S7, FANUC, J1939, J1979, BACnet, IEC 60870-5-101, IEC 60870-5-104, DNP3, M-bus), MQTT connectivity, and a web-based visual data flow programming to acquire data from the field, process it at the edge, and publish it to IoT cloud platforms. ESF features full remote device management through its integration with Everyware Cloud, Eurotech’s IoT integration platform. Develop and manage IoT edge computing applications. Easily connect to IoT devices and cloud services using IoT industrial protocols. Visually compose data flows to manage, analyze, and route data.
  • 8
    TotalCross

    TotalCross

    TotalCross

    Less than 5MB of footprint, ensuring high performance even when running in low-end devices. Basic knowledge of Java or Kotlin lets you build performing Apps for Android, Linux Arm, Windows, and iOS. Code once and run on every platform. Responsive User Interfaces provide the same behavior and usability. Tecdet develops systems for traffic control and inspection for the Brazilian government. They decided to rebuild their system for the Linux Arm architecture compatible with Toradex modules and chose TotalCross to develop their GUI.
  • 9
    Offensive 360

    Offensive 360

    Offensive 360

    We’ve spent years researching and developing an all-in-one product that is affordable for any organization, offering the best quality ever seen in the SAST industry. We’ve spent years in research to create an all-in-one product that is affordable to any organization with the best quality ever in the industry. O’360 conducts an in-depth source code examination, identifying flaws in the open-source components used in your project. In addition, it offers malware analysis, licensing analysis, and IaC, all enabled by our “brain” technology. Offensive 360 is developed by cybersecurity researchers, not by investors. It is unlimited, as we don’t charge you based on lines of code, projects, or users. Moreover, O360 identifies vulnerabilities that most SAST tools in the market would never find.
  • 10
    Total Processing

    Total Processing

    Total Processing

    Our expert team will help you avoid complex and unnecessary issues when taking payments. We make processing payments as seamless and secure as possible. Let your customers make payments online when and how they want with a seamless integration of payment methods. Make card payments even easier with our smart checkout solutions. Reduce cart abandonment and increase authorization rates. Manage your merchant account and online business with one seamless, flexible, integrated software. Accept payments on a huge range of ecommerce platforms, in-app services, payment plug-ins, shopping carts and custom solutions to enhance your payment pages.
  • 11
    Prolog

    Prolog

    Prolog

    Prolog is a logic programming language associated with artificial intelligence and computational linguistics. Prolog has its roots in first-order logic, a formal logic, and unlike many other programming languages, Prolog is intended primarily as a declarative programming language, the program logic is expressed in terms of relations, represented as facts and rules. A computation is initiated by running a query over these relations. Prolog was one of the first logic programming languages and remains the most popular such language today, with several free and commercial implementations available. The language has been used for theorem proving, expert systems, term rewriting, type systems, and automated planning, as well as its original intended field of use, natural language processing. Modern Prolog environments support the creation of graphical user interfaces, as well as administrative and networked applications.
  • 12
    OneEntry

    OneEntry

    OneEntry

    Ready-made solutions and tools for implementing any E-commerce project. Easy project scaling without unnecessary time and financial costs. One system incorporates all necessary tools used by developers, content managers and marketing experts. Familiar interfaces without limitations in technologies and programming languages. Easy connection of applications or websites through REST API. Easy export of products and services from YML or CSV files. Issuance of let's encrypt certificates. Daily backups and multiple servers will ensure the preservation of content. OneEntry combines the ease of use of a traditional website and application management system with the flexibility of a Headless CMS that includes all the necessary features for the successful operation of any business project.
    Starting Price: $29.99 per month
  • 13
    TrustLink

    TrustLink

    AarateK

    TrustLink™ is a high-performance biometric identity authentication platform that supports large-scale facial and fingerprint recognition. It is a powerful platform that includes multi-biometric identification technologies and can be used to capture, register, identify, and authenticate fingerprints and faces. It also provides the APIs on the server and client for fast development and deployment into a wide range of applications. TrustLink™ is equipped with Aratek Bione® dynamic optimization algorithm and TrustFace™ face recognition algorithm, it's specialized in the field of large-scale fingerprint and face recognition applications. TrustLink™ is an ideal biometric identity authentication platform for software developers.
  • 14
    Selenic

    Selenic

    Parasoft

    Selenium tests are often unstable and difficult to maintain. Parasoft Selenic fixes common Selenium problems within your existing projects with no vendor lock. When your team is using Selenium to develop and test the UI for your software applications, you need confidence that your testing process is identifying real issues, creating meaningful and appropriate tests, and reducing test maintenance. While Selenium offers many benefits, you want to get more out of your UI testing while leveraging your current practice. Find the real UI issues and get quick feedback on test execution so you can deliver better software faster with Parasoft Selenic. Improve your existing library of Selenium web UI tests, or quickly create new ones, with a flexible Selenium companion that integrates seamlessly with your environment. Parasoft Selenic fixes common Selenium problems with AI-powered self-healing to minimize runtime failures, test impact analysis to dramatically reduce test execution time, etc.
  • 15
    Code to Flowchart

    Code to Flowchart

    Code to Flowchart

    Turn code into interactive flowcharts with AI, and simplify complex logic instantly.
    Starting Price: Free
  • 16
    Tumult Analytics

    Tumult Analytics

    Tumult Analytics

    Built and maintained by a team of differential privacy experts, and running in production at institutions like the U.S. Census Bureau. Runs on Spark and effortlessly supports input tables containing billions of rows. Supports a large and ever-growing list of aggregation functions, data transformation operators, and privacy definitions. Perform public and private joins, filters, or user-defined functions on your data. Compute counts, sums, quantiles, and more under multiple privacy models. Differential privacy is made easy, thanks to our simple tutorials and extensive documentation. Tumult Analytics is built on our sophisticated privacy foundation, Tumult Core, which mediates access to sensitive data and means that every program and application comes with an embedded proof of privacy. Built by composing small, easy-to-review components. Provably safe stability tracking and floating-point primitives. Uses a generic framework based on peer-reviewed research.
  • 17
    SecuPi

    SecuPi

    SecuPi

    SecuPi provides an overarching data-centric security platform, delivering fine-grained access control (ABAC), Database Activity Monitoring (DAM) and de-identification using FPE encryption, physical and dynamic masking and deletion (RTBF). SecuPi offers wide coverage across packaged and home-grown applications, direct access tools, big data, and cloud environments. One data security platform for monitoring, controlling, encrypting, and classifying data across all cloud & on-prem platforms seamlessly with no code changes. Agile and efficient configurable platform to meet current & future regulatory and audit requirements. No source-code changes with fast & cost-efficient implementation. SecuPi’s fine-grain data access controls protect sensitive data so users get access only to data they are entitled to view, and no more. Seamlessly integrate with Starburst/Trino for automated enforcement of data access policies and data protection operations.
  • 18
    TrueZero Tokenization
    TrueZero’s vaultless data privacy API replaces sensitive PII with tokens allowing you to easily reduce the impact of data breaches, share data more freely and securely, and minimize compliance overhead. Our tokenization solutions are leveraged by leading financial institutions. Wherever PII is stored, and however it is used, TrueZero Tokenization replaces and protects your data. More securely authenticate users, validate their information, and enrich their profiles without ever revealing sensitive data (e.g. SSN) to partners, other internal teams, or third-party services. TrueZero minimizes your in-scope environments, speeding up your time to comply by months and saving you potentially millions in build/partner costs. Data breaches cost $164 per breached record, tokenize PII & protect your business from data loss penalties and loss of brand reputation. Store tokens and run analytics in the same way you would with raw data.
  • 19
    Apache SkyWalking
    Application performance monitor tool for distributed systems, specially designed for microservices, cloud-native and container-based (Kubernetes) architectures. 100+ billion telemetry data could be collected and analyzed from one SkyWalking cluster. Support log formatting, extract metrics, and various sampling policies through script pipeline in high performance. Support service-centric, deployment-centric, and API-centric alarm rule setting. Support forwarding alarms and all telemetry data to 3rd party. Metrics, traces, and logs from mature ecosystems are supported, e.g. Zipkin, OpenTelemetry, Prometheus, Zabbix, Fluentd.
  • 20
    Helios

    Helios

    Helios

    Helios provides security teams with context and actionable runtime insights that significantly reduce alert fatigue by enabling real-time visibility into app behavior. We provide precise insights into the vulnerable software components in active use and the data flow within them, delivering an accurate assessment of your risk profile. Save valuable development time by strategically prioritizing fixes based on your application’s unique context – focusing on the real attack surface. Armed with applicative context, security teams can determine which vulnerabilities really require fixing. With proof in hand, there is no need to convince the dev team that a vulnerability is real.
  • 21
    Lime2

    Lime2

    Lime Software

    Our tools provide an intuitive and simple approach to discovering risks within your Oracle Licensing. They were developed to assist our customers, ensuring they are compliant with their licenses. We have a track record, with over 15 years experience delivering accurate and timely Oracle licensing data for customers and partners. Oracle licensing is a complex and time-consuming task. Not knowing your environment can lead to serious financial penalties. Our tool can recognize over 4000 licensing terms, and if we don't have what you need, our experienced team can design a plug-in specifically for your needs.
  • 22
    Gemma

    Gemma

    Google

    Gemma is a family of lightweight, state-of-the-art open models built from the same research and technology used to create the Gemini models. Developed by Google DeepMind and other teams across Google, Gemma is inspired by Gemini, and the name reflects the Latin gemma, meaning “precious stone.” Accompanying our model weights, we’re also releasing tools to support developer innovation, foster collaboration, and guide the responsible use of Gemma models. Gemma models share technical and infrastructure components with Gemini, our largest and most capable AI model widely available today. This enables Gemma 2B and 7B to achieve best-in-class performance for their sizes compared to other open models. And Gemma models are capable of running directly on a developer laptop or desktop computer. Notably, Gemma surpasses significantly larger models on key benchmarks while adhering to our rigorous standards for safe and responsible outputs.
  • 23
    Syhunt Hybrid
    Syhunt dynamically injects data in web applications and analyzes the application response to determine if the application code is vulnerable, automating the web application security testing and proactively guarding your organization's Web infrastructure against several kinds of web application security threats. Syhunt Hybrid follows simple GUI standards, prioritizing ease of use and automation and thus requiring minimal to no user intervention before or during scans despite a large number of customization options. Compare past scan sessions to determine new, unchanged or removed vulnerabilities. Generate a comparison report that displays the evolution of vulnerabilities over time by automatically comparing previous scan session data related to a specific target.
  • 24
    Yandex Object Storage
    Objects in Object Storage are stored in multiple geographically distributed availability zones. Each replica is updated when you edit, create, or delete an object. To manage Object Storage, you can use tools that are compatible with Amazon S3, including the API, CLI, WinSCP, Java SDK, or Python SDK. To get started with Object Storage, go to the Yandex Cloud management console. Create and configure your first bucket. Drag files to the bucket screen to upload them. Physical media is located in Yandex data centers, which are highly secure facilities. Data is stored in an encrypted format and no one with access to the physical media can read the data.
  • 25
    Yandex Managed Service for YDB
    Serverless computing is ideal for systems with unpredictable loads. Storage scaling, query execution, and backup layers are fully automated. The compatibility of the service API in serverless mode allows you to use the AWS SDKs for Java, JavaScript, Node.js, .NET, PHP, Python, and Ruby. YDB is hosted in three availability zones, ensuring availability even if a node or availability zone goes offline. If equipment or a data center fails, the system automatically recovers and continues working. YDB is tailored to meet high-performance requirements and can process hundreds of thousands of transactions per second with low latency. The system was designed to handle hundreds of petabytes of data.
  • 26
    BlueFlag Security

    BlueFlag Security

    BlueFlag Security

    BlueFlag Security provides multi-layer defense, protecting developer identities and their tools throughout the software development lifecycle (SDLC). Don't let uncontrolled developer and machine identities become the Achilles' heel of your software supply chain. Weaknesses in these identities create a backdoor for attackers. BlueFlag seamlessly integrates identity security across the SDLC safeguarding your code, tools, and infrastructure. BlueFlag automates the rightsizing of permissions for developer and machine identities, enforcing the principle of least privilege throughout the dev environment. BlueFlag enforces strong identity hygiene by deactivating off-boarded users, managing personal access tokens, and restricting direct access to developer tools and repositories. BlueFlag's ensures early detection and prevention of insider threats and unauthorized privileged escalation by continuously monitoring behavior patterns across the CI/CD.
  • 27
    CI Fuzz

    CI Fuzz

    Code Intelligence

    CI Fuzz ensures robust and secure code with test coverage up to 100%. Use CI Fuzz from the command line or in the IDE of choice to generate thousands of test cases automatically. CI Fuzz analyzes code as it runs, just like a unit test, but with AI support to efficiently cover all paths through the code. Uncover real bugs in real-time and say goodbye to theoretical issues and false positives. Find real issues with all the information needed to quickly reproduce and fix them. Test your code with maximum code coverage and automatically detect typical security-relevant bugs like injections and remote code executions automatically in one go. Get fully covered to deliver the highest quality software. Conduct real-time code analysis with CI Fuzz. Take unit tests to the next level. It employs AI for comprehensive code path coverage and the automatic generation of thousands of test cases. Maximize pipeline performance that doesn't compromise software integrity.
    Starting Price: €30 per month
  • 28
    EmpoweredNEXT

    EmpoweredNEXT

    Empowered Systems

    With over a million global users and a deep understanding of different industries, our purpose-built, no-code platform is designed to scale with your organization’s present and future needs. By integrating data and domain expertise, it empowers stakeholders and IT leaders to make risk-aware decisions in real-time and contribute to a holistic view of the organization’s needs, rather than it being siloed. Plus, our intuitive user experience ensures that everyone can contribute to developing an application that fits all of your GRC needs. Don’t let complex software and elongated implementation times slow down your business growth; switch to EmpoweredNEXT and simplify your risk management needs with a no-code platform built just for you. Our groundbreaking platform boasts a unique no-code application framework that sets it apart from anything else in the market. With intuitive modeling tools, every aspect of an application can be defined and managed with ease.
  • 29
    AppSec Labs

    AppSec Labs

    AppSec Labs

    AppSec Labs is a dedicated application security organization, positioned in the top 10 application security companies worldwide. Our mission is to share our hands-on experience, by providing cutting-edge penetration tests, training/academy & consulting. Full cycle application security consulting services, from design to production. Penetration testing and security assessment services for web, desktop, and mobile applications. High-end, hands-on, training in secure coding and penetration testing on a variety of platforms. We work with a multitude of clients from different industry vectors. In addition to our high-profile customers, we work with small companies and young start-ups. Working with a diverse range of companies from the fields of technology, finance, commerce, HLS, and many more, enables us to allocate the best-suited, experienced, and most naturally-inclined team member to each client, guaranteeing the highest level of service.
  • 30
    Gemma 2

    Gemma 2

    Google

    A family of state-of-the-art, light-open models created from the same research and technology that were used to create Gemini models. These models incorporate comprehensive security measures and help ensure responsible and reliable AI solutions through selected data sets and rigorous adjustments. Gemma models achieve exceptional comparative results in their 2B, 7B, 9B, and 27B sizes, even outperforming some larger open models. With Keras 3.0, enjoy seamless compatibility with JAX, TensorFlow, and PyTorch, allowing you to effortlessly choose and change frameworks based on task. Redesigned to deliver outstanding performance and unmatched efficiency, Gemma 2 is optimized for incredibly fast inference on various hardware. The Gemma family of models offers different models that are optimized for specific use cases and adapt to your needs. Gemma models are large text-to-text lightweight language models with a decoder, trained in a huge set of text data, code, and mathematical content.