Suggested Categories:

Algorithmic Trading Software
Algorithmic trading software enhances and automates trading capabilities for trading financial instruments such as equities, securities, digital assets, currency, and more. Algorithmic trading software, also known as algo trading software or automated trading software, enables the automatic execution of trades depending on occurrences of specified criteria, indicators, and movements by connecting with a broker or exchange.
No-Code Development Platforms
No-code development platforms provide a way for users to design, build, and develop software applications without the need for traditional coding. They are built in such a way that users can rely on simple visual interfaces with drag and drop type tools, allowing them to rapidly develop applications with minimal technical knowledge. This makes no-code development platforms ideal for any user regardless of programming experience, from hobbyists to entrepreneurs. Furthermore, modern no-code platforms allow complex mobile apps or web projects to be created more quickly than ever before.
Code Collaboration Tools
Code collaboration tools are platforms that enable developers to work together on software projects by facilitating real-time collaboration, version control, and code sharing. These tools allow multiple developers to edit and review code simultaneously, track changes, and manage different versions of code through branches and commits. Key features typically include code reviews, pull requests, conflict resolution, issue tracking, and integration with version control systems like Git. Code collaboration tools are essential for team-based development environments, ensuring smooth coordination and improving productivity in software projects.
QR Code Generators
QR code generators are tools that allow users to create quick response (QR) codes, which are machine-readable barcodes that store information such as URLs, text, contact details, or Wi-Fi credentials. These tools typically allow users to customize QR codes by changing their size, color, and design while ensuring the code remains scannable. QR code generators are commonly used for marketing, event registration, payments, product packaging, and contactless interactions. They help businesses and individuals provide an easy way for users to access digital content or services through their smartphones or other scanning devices.
Code Editors
Code editors are software tools that allow developers to write, edit, and debug source code for programming and web development. These editors provide essential features like syntax highlighting, code completion, auto-indentation, and error detection to enhance productivity and reduce coding errors. Many code editors also offer integrations with version control systems (like Git), debuggers, and build tools, allowing developers to manage their code and workflows efficiently. While some code editors are lightweight and focused solely on text editing, others offer extensive features and customization options through plugins and extensions. By providing a streamlined environment for coding, code editors are essential for software development, web development, and scripting tasks.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Infrastructure as Code Software
Infrastructure as Code (IaC) tools are software solutions that enable developers and IT teams to automate the provisioning, configuration, and management of infrastructure using code. These tools allow users to define and manage infrastructure components like servers, databases, and networking resources through configuration files, ensuring consistency and repeatability in infrastructure setups. IaC tools typically support version control, enabling teams to track changes and collaborate on infrastructure management.
Code Search Engines
Code search engines are specialized search tools that allow developers to search through codebases, repositories, or libraries to find specific functions, variables, classes, or code snippets. These tools are designed to help developers quickly locate relevant parts of code, analyze code quality, and identify reusable components. Code search engines often support various programming languages, providing search capabilities like syntax highlighting, filtering by file types or attributes, and even advanced search options using regular expressions. They are particularly useful for navigating large codebases, enhancing code reuse, and improving overall productivity in software development projects.
Layer 2 Protocols
Layer 2 protocols are blockchain protocols that are built on top of an existing blockchain network. A layer 2 protocol is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications can be built on Layer 2 protocols, and layer 2 protocols interact with layer 1 protocols in order to improve efficiency and overall user experience.
Code Enforcement Software
Code enforcement software is software that helps local government agencies and municipalities manage and enforce building codes, zoning laws, and other regulatory compliance requirements. These platforms typically provide features for tracking violations, issuing citations, managing inspections, and automating the code enforcement process. Code enforcement software can also include tools for scheduling inspections, documenting findings, generating reports, and managing case histories. It helps ensure that properties comply with local laws and ordinances, improving efficiency and accountability in enforcement processes. Additionally, it allows for better communication between enforcement officers, residents, and other stakeholders.
Coding Challenge Platforms
Coding challenge platforms, also known as code assessment and technical skills testing platforms, enable developers and organizations to test their coding skills to see what skills need to be improved, or to determine the coding skills of a potential hire. Many coding challenge platforms also offer features like coding competitions, mock interviews, and collaboration opportunities for learning with others. These platforms are popular among job seekers, developers, and coding enthusiasts looking to enhance their problem-solving abilities.
Low-Code Development Platforms
Low-code development platforms are software tools designed to assist developers with the creation of software applications. They provide an alternate means to implementation, reducing the amount of manual coding that needs to be done. Platforms vary based on the type of application being created, enabling users to quickly build and deploy business applications without having extensive technical knowledge or software development experience. Features may include tools for visual modeling, integration connectors, and user interface components.
AI Coding Assistants
AI coding assistants are software tools that use artificial intelligence to help developers write, debug, and optimize code more efficiently. These assistants typically offer features like code auto-completion, error detection, suggestion of best practices, and code refactoring. AI coding assistants often integrate with integrated development environments (IDEs) and code editors to provide real-time feedback and recommendations based on the context of the code being written. By leveraging machine learning and natural language processing, these tools can help developers increase productivity, reduce errors, and learn new programming techniques.
Source Code Management Software
Source code management (SCM) software is a type of software to help developers track, manage, and version control their source code throughout the software development lifecycle. These tools allow multiple developers to collaborate on the same project by maintaining a centralized repository where code changes are stored and tracked. SCM software typically includes features like version control, branching, merging, and conflict resolution to ensure that code changes are properly managed and integrated. It also provides tools for tracking issues, auditing changes, and ensuring that all team members are working with the latest codebase. SCM software is essential for maintaining code integrity, improving collaboration, and enhancing productivity in development teams.
B2B Payment Platforms
B2B payment platforms are digital solutions designed to facilitate and streamline financial transactions between businesses. These platforms provide secure, efficient, and scalable methods for companies to send and receive payments, manage invoices, and handle cross-border transactions. Features often include support for various payment methods (such as ACH, wire transfers, credit cards, and e-wallets), invoice management, payment reconciliation, and fraud prevention tools. B2B payment platforms help businesses reduce administrative costs, improve cash flow management, and ensure compliance with regulatory requirements. By automating payment workflows and improving the speed and accuracy of transactions, these platforms enhance the overall efficiency of business operations.
B2B Data Providers
B2B data providers offer companies access to large sets of business-related data, which can include information on companies, contacts, industries, financials, and market trends. This data is valuable for businesses looking to expand their customer base, enhance lead generation, conduct market research, or refine their sales strategies. B2B data providers often deliver enriched contact information, company profiles, and detailed insights on decision-makers, helping businesses identify potential leads and make informed decisions. These services may include databases with direct access to contacts, industry reports, and analytics to improve targeted outreach and account-based marketing strategies.
B2B eCommerce Platforms
B2B ecommerce platforms are digital solutions that enable businesses to conduct online transactions with other businesses, focusing on bulk buying and selling, wholesale pricing, and complex procurement processes. These platforms allow businesses to create customized catalogs, manage pricing for different customers or customer segments, and streamline the ordering process. Key features often include secure payment gateways, order tracking, inventory management, and integration with backend systems like ERP and CRM. B2B ecommerce platforms are designed to handle large volumes of orders, facilitate negotiations, and provide business buyers with self-service options for placing orders, managing accounts, and tracking deliveries. They are ideal for businesses looking to expand their reach, optimize purchasing workflows, and build long-term relationships with clients.
P2P Crypto Exchanges
P2P (peer-to-peer) crypto exchanges are cryptocurrency exchanges where users can exchange cryptocurrencies and digital assets directly between themselves, often locally, without any third-party involvement from a broker or custodian.
Code Coverage Tools
Code coverage tools are software utilities designed to analyze the source code of an application and report on the level of code that is tested by automated tests. They usually measure the percentage of lines, blocks, or branches of code that have been executed in a test suite. Many popular programming languages have their own code coverage tools available for developers to use.
Code Signing Software
Code signing software is a type of program that digitally signs code to ensure its authenticity and integrity. It verifies the identity of the author or publisher of the code, and helps protect users from malicious software by providing evidence that the code was not altered during transit. Code signing can be used for a variety of purposes, including software distribution, configuration management, and digital document authentication. It is an essential part of maintaining secure electronic communication between two parties.
View more categories (20) for "ns2 code with algorithm"
  • 1
    RECOGNITO

    RECOGNITO

    RECOGNITO

    RECOGNITO is a global leader and trusted provider of Face Biometrics and ID Document Verification solutions that are fully optimized for usability, security, and privacy. Recognito SDK is the world's leading face-based identity verification solution with NIST FRVT Top Algorithm. - Product • Face Recognition SDK: 🏆 NIST FRVT Top 1 Face Recognition Algorithm • Face Liveness Detection SDK: DeepFake Detectable, 2D/3D Liveness Detection Algorithm • ID Document Verification SDK: ID, Passport Document OCR and MRZ, Barcode Analysis - Features • On-premise, Fully offline and On-device SDK • Compact Library-type SDK for easy on-premise installation...
    Leader badge
    Starting Price: Free
  • 2
    Authologic

    Authologic

    Authologic

    ...With automated routing, fallback & workflow optimization, it adapts easily to multiple markets without rebuilding onboarding processes. Built for compliance & scalability, Authologic is eIDAS 2.0-ready, PSD2 AISP-licensed, ISO 27001 / 9001 / 22301 certified, and backed by Y Combinator, operating from London, San Francisco & Warsaw.
    View Software
    Visit Website
  • 3
    IDcheck

    IDcheck

    IDcheck

    IDcheck specialises in cloud-based, automated Biometric Identity Screening, Fraud Detection & KYC-AML. Through our proprietary Facial Recognition, Frictionless Liveness and Motion Detection algorithms, we authenticate global identity documents, with advanced AI and OCR. Few professionals possess the skills to detect fake IDs. If a fake ID passes, all standard background screening is performed on the real person instead of the fake, leaving organisations at risk of fraud and AML violations. IDcheck registration and log-in is far more secure than SMS verification. ...
  • 4
    MIRACL

    MIRACL

    MIRACL

    ...MIRACL Trust offers a safer, smoother authentication experience. One step. No passwords. No problem. Traditional multi-factor authentication is slow and cumbersome. MIRACL is a smoother, safer alternative to traditional MFA. 2 seconds to log in with error rates as low as 1/10th that of passwords. No passwords necessary. One PIN, and you’re in. Our cryptographic technology means that user info stays with users. MIRACL Trust offers an effortless login experience that puts users first, rolls out hassle-free, and keeps data locked up tight. PSD2 SCA compliant, GDPR compliant and satisfies NJ Gaming MFA requirements.
  • 5
    W2

    W2

    FullCircl

    ...In August 2023, W2 Global Data Solutions Ltd was acquired by UK company intelligence platform, FullCircl. The new combined entity enables organizations to address many of the most critical commercial and regulatory challenges. W2’s mission is simple; complexity should never be a barrier to business.
    Starting Price: £500
  • 6
    FacePlugin

    FacePlugin

    FacePlugin

    ...Our robust suite of services includes state-of-the-art technologies such as Face Recognition, Face Liveness Detection, ID Document Recognition and Palm print recognition Our face recognition algorithm is super fast and unbiased. Our liveness detection model can detect spoofing attacks including printed photo, video replay, 3D masks and deepfake. Our ID document recognition solution can recognize ID documents from 180+ countries and it can recognize all kinds of ID documents including ID card, Passport and Driver License. ...
    Leader badge
    Starting Price: $0
  • 7
    Alice Biometrics

    Alice Biometrics

    Alice Biometrics

    ...Alice Biometrics is the perfect solutions for companies with a need to verify users either for business operations (shared mobility) or due to legal requirements (fintech). We provide leading anti-fraud technology with more than 10 years of research and 64 technical papers published. Our algorithm has been evaluated by NIST (National Institute of Standards and Technology).
    Starting Price: Free
  • 8
    Sedicii

    Sedicii

    Sedicii

    ...Sedicii has developed a solution, KYCexpert, which enables organisations to onboard corporate and individual clients in a simple, easy to use cloud based solution. In the context of Anti-Money Laundering (AML) transaction monitoring processes, banks can collaborate and jointly compute advanced risk assessment algorithms that consume information available in the different banks about their customers without actually having to share that information by using our patented multi-party computation (MPC) cryptographic protocol. Sedicii has developed a solution, KYCexpert, which enables organisations to onboard corporate and individual clients in a simple, easy to use cloud based solution.
  • 9
    Red Flag Alert

    Red Flag Alert

    Red Flag Alert

    Having real-time and comprehensive data is vital when making informed decisions. Our cloud-based business intelligence software provides the tools you need to take a deep dive into the companies you work with. Gain a thorough understanding of their financial performance, protect yourself from fraud, and be instantly notified of any ongoing developments or changes. Using market-leading data owners alongside our own proprietary AI-powered algorithm, our software provides unique insights into thousands of UK and international companies. Stay ahead of the competition and protect yourself from financial loss by immediately identifying and managing risk.
  • 10
    Pixl.AI

    Pixl.AI

    PixDynamics

    ...Our solutions use liveness detection technology to determine and validate customer’s identities in real time. It does so by comparing the user’s live image with the uploaded document using biometric anti-spoof algorithms. Our solution finds financial frauds before onboarding customers in banks, NBFCs, and mobile wallets.
  • 11
    AssureID

    AssureID

    Acuant

    ...Solutions integrate easily into any environment in any industry and read IDs from over 196 countries and all 50 US states. Accurate data population with 50+ forensic tests run in seconds in the same seamless process. Three classes of facial match & liveness tests including NIST algorithm, intuitive & fast. World-class patented image capture that automatically crops & detects document type & region.
  • 12
    Innovatrics ABIS

    Innovatrics ABIS

    Innovatrics

    ...We have successfully deployed our ABIS to hundreds of large scale biometric projects, including some of the most complex biometric systems worldwide. Utilizing our fingerprint, facial and iris recognition technology, you can easily get a solution tailored to your business processes. Our high-performing algorithms are consistently ranked among the best based on independent NIST tests. With our ABIS modules, you can build an identity management solution tailored to your needs. Add additional modules and upgrade when necessary. Our licensing policies are flexible to suit the needs of each project.
  • 13
    ImageWare CloudID
    ...ImageWare CloudID® is easily incorporated into new or existing cloud-enabled environments or integrated as cloud-ready software into traditional networked client server and data center IT infrastructures. Two innovations differentiate this biometric identity platform, virtually any biometric modality and algorithm from any vendor can be quickly incorporated into the system, and the system can be easily scaled to satisfy the requirements of small organizations or entire counties, providing ultra-scalable real-time solutions. ImageWare CloudID’s server platform is a set of configurable, server-based software modules designed to add or enhance biometric identity management and credential issuance capabilities to existing applications or support the development of these capabilities in new end-to-end applications.
  • 14
    Konfirmi

    Konfirmi

    Konfirmi

    Konfirmi gives your website or app easy-to-setup verification (which you can combine or use standalone). Verification methods include: - 2 Factor Authentication / Multi Factor Authentication (2FA/MFA) - SMS/Email verification - True age verification (KBA Checks) - True customer name/address/info verification (KBA Checks) - Biometric Authentication - Single Sign On (SSO). Check age, addresses, photo IDs, more. Quickly add to any website or application. Comply with various USA and other laws. ...
    Starting Price: $19
  • 15
    DoxAI

    DoxAI

    Lakeba

    ...Our suite of products supports end-to-end workflows ensuring privacy and compliance. We adhere to stringent information security standars to safeguard your sensitive data as part of our certifications - SOC2 Type 2, HIPAA, GDPR and PCI DSS. Our technology is available in UI, iFrame or API. Meet us at Booth 108 to see how we automate your business. Let’s shape the future of your processes!
  • 16
    SEON

    SEON

    SEON

    ...Our unique approach combines social signals with deep digital footprinting, leveraging fully-explainable machine learning to identify emerging fraud threats. As a recipient of numerous accolades, including Sifted's Rising 100, Deloitte's Technology Fast 50, Crunchbase's Emerging Unicorn, and G2's Fastest Growing Software in 2022, SEON has raised $94 million in Series B funding as of April 2022. Operating globally from Austin, London, Budapest, and Singapore, we are committed to making the world safer.
    Starting Price: €599
  • 17
    greenID
    ...The complete solution enables organisations to verify and onboard new customers reliably and efficiently, with the options of document and biometric verification, via web or mobile channels. For customers of greenID, adding on biometric and document verification requires simple code changes or SDK integration, which can be completed from a few hours to just minutes. 120+ employees in Australia including R&D, technology, product, sales, consultation, marketing, professional services, customer support. GBG offers a range of solutions that help organisations quickly validate and verify the identity and location of their customers.
  • 18
    iDIN

    iDIN

    CM.com

    ...Your customer selects his or her bank, logs in, and checks which personal data is provided. After approval, the user returns to the online environment of your company. Optimize the customer journey and the digital onboarding process. Scan the iDIN QR code, give approval in your bank's app, and you are logged in.
  • 19
    authID.ai

    authID.ai

    authID.ai

    ...Ensure user accounts and transactions cannot be compromised by account takeover or identity fraud. Gain increased assurance with cloud-based biometric authentication of high-risk transactions. Eliminate passwords with FIDO2 strong authentication tied to a trusted identity. Confirm the identity of new users remotely- know they are who they say they are. Our mobile biometric solutions help you onboard customers and verify their presence with ease while ensuring their accounts cannot be compromised by account takeover or identity fraud. Learn how authID can help you transform identity management.
  • 20
    GIBots KYC Suite
    In a welcome move, the RBI has recently permitted using Video KYC as a means of remote customer verification in the banking and financial services sector. GiBots KYC SUITE is an AI driven end to end KYC solution in less than 2 minutes for Customer Identification Process. Future focused BFSI and Fintech companies can take benefit if this Video and Self KYC process. This involves Live photo capturing of Customer on Video and validating documents and proof of possession of documents for Verifying Identification Information. Applicant data and face would be verified and immediately recognized and flagged off. ...
  • 21
    CloudABIS

    CloudABIS

    M2SYS Technology

    Built with nearly 20 years of experience in large-scale biometric technology projects, CloudABIS™ is a superscalar, biometrics-as-a-service (BaaS) matching system that removes the burden & cost associated with building and maintaining a reliable biometric identification system. CloudABIS™ can compare millions biometric templates/sec for fast 1:N matching & de-duplication requirements. Customers simply connect through our API or CloudApper™ software & instantly have the ability to perform...
  • 22
    PassFort Lifecycle

    PassFort Lifecycle

    Moody's Analytics

    Rapidly onboard, off-board and monitor customers at scale. ‍ Our low-to-no-code SaaS solution thrives on complexity and empowers compliance teams in regulated financial services firms to be efficient and build trusted customer relationships globally. Connect your data providers in one place. You have a world of customers to onboard, let’s do that in one place. Use PassFort Lifecycle to access market-leading identity verification, credit, business registry and fraud data around the world through a single API. ...
  • 23
    KROTON

    KROTON

    H3M Analytics

    ...The KROTON product suite includes 4 AI-based modules which powerfully combine compliance know-how with data science. H3M KROTON Suspect Miner addresses the major problems related to legacy systems with its unique machine-learning approach utilizing active learning. Eliminate 2/3 of false positives with machine learning. Active Learning routinely discovers emerging laundering methods. Active Learning to incorporate analyst know-how with AI capability, and pro-active labeling to help the machines.
  • 24
    Caf

    Caf

    Caf

    ...Its flagship offering, the "Know Your Everything" platform, integrates multiple technologies to validate user identities, including facial biometrics, document verification, and data source validation. It supports customizable workflows through a no-code interface, allowing businesses to tailor onboarding processes to their specific needs. Caf.io's solutions encompass Know Your Customer (KYC), Know Your Business (KYB), Account Takeover (ATO) prevention, and Anti-Money Laundering (AML) compliance, providing a holistic approach to identity management. Additionally, Caf features an identity intelligence center for real-time monitoring and decision-making, and leverages a decentralized identity network, ALL.ID, to enhance data accuracy and security.
  • 25
    Verify 365

    Verify 365

    Verify 365

    Verify 365 is the advanced client onboarding solution for law firms, estate agents, accountants and IFAs. With Verify 365, you can rest assured that your clients are thoroughly vetted, saving you time and reducing the risk of fraud. Verify 365 offers biometric verification, ensuring that your clients are who they say they are. Verify 365 conducts thorough ID checks, including government-issued ID and address verification. Our AML checks ensure that your clients are not on any financial crime...
    Starting Price: $2,50 per verification
  • 26
    Mitek

    Mitek

    Mitek Systems

    ...Mitek’s solutions help businesses reduce financial losses by preventing account takeover and synthetic identity fraud while ensuring compliance with regulatory mandates such as KYC and AML. The company’s user-friendly no-code platform accelerates deployment and boosts customer confidence with simple, secure user experiences. Trusted by over 7,900 organizations worldwide, Mitek continues to innovate in identity verification and fraud defense.
  • 27
    ComplyCube

    ComplyCube

    ComplyCube

    ...It offers the most complete, flexible, and cost-effective AML/KYC tools to help you build trust in your business - Whether you’re a startup or a multinational enterprise, ComplyCube will have a solution tailored to your needs. ComplyCube boasts the fastest omnichannel integration turnaround in the market with Low/No-Code solutions, API, Mobile & Web SDKs, Client Libraries, and CRM Integrations.
    Starting Price: $0.10 per credit
  • 28
    cidaas

    cidaas

    WidasConcepts

    cidaas is the optimal solution for fast and secure identity management. Thanks to cidaas you create one identity per user across all your channels. cidaas is based on OAuth2.0 and OpenID Connect standards, provides strong API security and with integrated Bot Net Detection and Fraud Detection a secure journey across all your business channels. Modern Identity and Access Management goes like this. Comprehensive feature set for quick and easy integration and implementation of all use cases and systems. We take care of it so you can focus on your core business. ...
  • 29
    Udentify

    Udentify

    Fraud.com

    Know the real identity of your customer, user, or employee with the Udentify Identity Verification and Biometric Authentication solution. Challenges we solve: - Identify verification - Onboarding - New account opening - Age verification - Fraud prevention - Biometric authentication - Passwordless authentication - Strong customer authentication - KBA replacement - KYC and AML compliance Behind the scenes, Udentify embeds cutting-edge technologies into...
    Starting Price: $0.17
  • Previous
  • You're on page 1
  • Next