Results for: swing based visual query builder java code

Suggested Categories:

No-Code Development Platforms
No-code development platforms provide a way for users to design, build, and develop software applications without the need for traditional coding. They are built in such a way that users can rely on simple visual interfaces with drag and drop type tools, allowing them to rapidly develop applications with minimal technical knowledge. This makes no-code development platforms ideal for any user regardless of programming experience, from hobbyists to entrepreneurs. Furthermore, modern no-code platforms allow complex mobile apps or web projects to be created more quickly than ever before.
QR Code Generators
QR code generators are tools that allow users to create quick response (QR) codes, which are machine-readable barcodes that store information such as URLs, text, contact details, or Wi-Fi credentials. These tools typically allow users to customize QR codes by changing their size, color, and design while ensuring the code remains scannable. QR code generators are commonly used for marketing, event registration, payments, product packaging, and contactless interactions. They help businesses and individuals provide an easy way for users to access digital content or services through their smartphones or other scanning devices.
Code Collaboration Tools
Code collaboration tools are platforms that enable developers to work together on software projects by facilitating real-time collaboration, version control, and code sharing. These tools allow multiple developers to edit and review code simultaneously, track changes, and manage different versions of code through branches and commits. Key features typically include code reviews, pull requests, conflict resolution, issue tracking, and integration with version control systems like Git. Code collaboration tools are essential for team-based development environments, ensuring smooth coordination and improving productivity in software projects.
Visual Configuration Software
Visual configuration software allows users to create and customize products by visually selecting options and features, making it ideal for industries like manufacturing, retail, and custom products. These platforms provide an interactive interface where customers or users can configure products by choosing colors, sizes, materials, and other specifications, all in real time. The software typically includes 3D models or visual representations of the product to give users an accurate view of their customizations. Visual configuration software often integrates with e-commerce platforms, product management systems, and order fulfillment processes, ensuring a seamless experience from design to delivery.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Coding Challenge Platforms
Coding challenge platforms, also known as code assessment and technical skills testing platforms, enable developers and organizations to test their coding skills to see what skills need to be improved, or to determine the coding skills of a potential hire. Many coding challenge platforms also offer features like coding competitions, mock interviews, and collaboration opportunities for learning with others. These platforms are popular among job seekers, developers, and coding enthusiasts looking to enhance their problem-solving abilities.
Data Visualization Software
Data visualization software helps converting numeric and textual data into visual tools and performance dashboards in order to identify and analyze possible patterns.
Home Builder Software
Home builder software facilitates the monitoring of home-building projects, their progress, scheduling and costs, while providing customer management tools.
Website Builder Software
Website builders are tools that allow users to create websites without coding. These platforms provide a range of features and tools, such as drag-and-drop design elements, hosting, and domain registration. Website builders have become popular due to their ease-of-use and cost savings compared to hiring a professional web developer or designer. They are also typically well supported with step-by-step tutorials and customer service options for those who need help getting started.
Code Editors
Code editors are software tools that allow developers to write, edit, and debug source code for programming and web development. These editors provide essential features like syntax highlighting, code completion, auto-indentation, and error detection to enhance productivity and reduce coding errors. Many code editors also offer integrations with version control systems (like Git), debuggers, and build tools, allowing developers to manage their code and workflows efficiently. While some code editors are lightweight and focused solely on text editing, others offer extensive features and customization options through plugins and extensions. By providing a streamlined environment for coding, code editors are essential for software development, web development, and scripting tasks.
Visual Project Management Software
Visual project management software enables teams and project managers to visually plan and track progress of projects.
Infrastructure as Code Software
Infrastructure as Code (IaC) tools are software solutions that enable developers and IT teams to automate the provisioning, configuration, and management of infrastructure using code. These tools allow users to define and manage infrastructure components like servers, databases, and networking resources through configuration files, ensuring consistency and repeatability in infrastructure setups. IaC tools typically support version control, enabling teams to track changes and collaborate on infrastructure management.
Code Search Engines
Code search engines are specialized search tools that allow developers to search through codebases, repositories, or libraries to find specific functions, variables, classes, or code snippets. These tools are designed to help developers quickly locate relevant parts of code, analyze code quality, and identify reusable components. Code search engines often support various programming languages, providing search capabilities like syntax highlighting, filtering by file types or attributes, and even advanced search options using regular expressions. They are particularly useful for navigating large codebases, enhancing code reuse, and improving overall productivity in software development projects.
Online Form Builders
Online form builders enable the creation of fillable forms through a drag-and-drop interface in order to be embedded or shared on web pages.
Code Enforcement Software
Code enforcement software is software that helps local government agencies and municipalities manage and enforce building codes, zoning laws, and other regulatory compliance requirements. These platforms typically provide features for tracking violations, issuing citations, managing inspections, and automating the code enforcement process. Code enforcement software can also include tools for scheduling inspections, documenting findings, generating reports, and managing case histories. It helps ensure that properties comply with local laws and ordinances, improving efficiency and accountability in enforcement processes. Additionally, it allows for better communication between enforcement officers, residents, and other stakeholders.
Revenue-Based Financing Companies
Revenue-based financing companies, also known as royalty-based financing companies, are companies that provide financing to businesses with predictable revenue streams. Revenue-based financing firms provide upfront capital in exchange for a percentage of top line revenue, or a fixed percentage of each contract. Revenue-based financing solutions are ideal for companies with predictable, recurring revenue such as SaaS companies, ecommerce retailers, subscription businesses, and more.
Account-Based Advertising Software
Account based advertising software is used by businesses and marketers to improve customer engagement through the use of targeted and personalized digital ads.
Usage-Based Billing Software
Usage-based billing software, also known as metered billing software, enables companies to charge their clients and customers based on their usage, rather than one-time fees or flat subscription rates. Usage-based billing systems provide companies with the ability to offer pricing models based on metered billing, and also offer usage and consumption statistics.
Account Based Marketing Software
Account based marketing software is a technology solution that enables businesses to target and engage specific accounts or customer segments. This software typically provides features such as segmentation, personalized content, account profiles and customer intelligence. It helps marketers identify the right audiences and deliver relevant messages to boost brand awareness and increase sales.
AI Coding Assistants
AI coding assistants are software tools that use artificial intelligence to help developers write, debug, and optimize code more efficiently. These assistants typically offer features like code auto-completion, error detection, suggestion of best practices, and code refactoring. AI coding assistants often integrate with integrated development environments (IDEs) and code editors to provide real-time feedback and recommendations based on the context of the code being written. By leveraging machine learning and natural language processing, these tools can help developers increase productivity, reduce errors, and learn new programming techniques.
View more categories (20) for "swing based visual query builder java code"

48 Products for "swing based visual query builder java code" with 3 filters applied:

  • 1
    Visual Guard
    Visual Guard is an advanced identity and access management (IAM) tool offering a complete solution for securing sensitive applications and data. With centralized management of users and permissions, Visual Guard facilitates the implementation of robust, standards-compliant security policies. User management : Create, modify & delete user accounts Integration with LDAP or Active Directory directories Automatic synchronization of user information Access control : Precise definition...
    Starting Price: 1.55/month/user
  • 2
    Frontegg

    Frontegg

    Frontegg

    .... Developers reduce toil and regain focus on core product work, while stakeholders move faster without bottlenecks. Frontegg supports modern identity features including SSO, MFA, role-based access control, entitlements, multi-tenancy, and audit logs. Its low-code platform integrates in days and provides a user-friendly admin portal that bridges technical and non-technical teams. Frontegg increases operational efficiency, improves security posture, and enhances the customer experience.
    Leader badge
    Starting Price: Free
    View Software
    Visit Website
  • 3
    TrustBuilder

    TrustBuilder

    TrustBuilder

    ... airtight, phishing-resistant security, passwordless experience, and seamless integration. > TrustBuilder's tailor made CIAM provides PBAC delivering fine grained authorization based on attributes with customisable workflows.
    Starting Price: € 10 per user / per year
  • 4
    Alitheon FeaturePrint
    Every physical object is unique. Our technology can distinguish any solid object from even visually identical items based on the object itself – there is no need for serialization, bar codes, RFID, etc. It can be used for object identification and authentication at low cost with statistically perfect results. This new branch of machine vision is called FeaturePrint™. As each person has unique fingerprints, every physical object has unique surface characteristics that distinguish it from all...
  • 5
    LoginID

    LoginID

    LoginID

    With just a few lines of code, LoginID enables websites and apps to integrate FIDO/FIDO2 certified multi-factor authentication via our easy to use SDKs and APIs. Our platform leverages the biometrics on the end user's device to create a private key, public key pair that allows for seamless strong customer authentication. No app installation is required and the private key is stored securely on the end user's device, never leaving. Additionally, LoginID offers Transaction Confirmation, where...
    Starting Price: Free
  • 6
    ZITADEL

    ZITADEL

    ZITADEL

    ... login interfaces. The platform supports role-based access control, allowing for precise permission assignments based on user roles, and is inherently multi-tenant, facilitating easy extension of applications to new organizations. ZITADEL's extensibility enables seamless adaptation to various workflows, user management processes, and brand guidelines, with features like ZITADEL Actions that execute workflows after predefined events without the need for additional code deployment.
    Starting Price: $100 per month
  • 7
    EasySecure

    EasySecure

    EasySecure

    Grant access to a user at the push of a button. Easily determine who may enter where and when, and view who has entered where and when. Compose the ideal situation. Registration is possible with a mobile phone, finger, face, QR, card, code and/or license plate. No unnecessary repetition of the same administrative actions, save time and experience more control. As soon as someone leaves employment, access is also automatically blocked. Role-based and scalable. Manage access control for one...
  • 8
    GPayments

    GPayments

    a neurocom company

    GPayment provides a complete range of Fraud Prevention products based on the 3D Secure protocol, Verified by Visa, Mastercard SecureCode, JCB J/Secure, American Express SafeKey and Diners Club International ProtectBuy. Reduce credit card fraud and eliminate chargebacks through liability shift. Reduce the potential for online fraud and stay in control of authenticating transactions. Collect a rich dataset for more accurate risk based authentication. Our ActiveServer hosted service provides...
  • 9
    swIDch

    swIDch

    swIDch

    swIDch’s OTAC technology combines elements of the three most common authentication systems, user ID/passwords, RSA hardware/ software for generating authentication codes, and tokenization. Based on the world’s first 1-way dynamic authentication technology, OTAC sets a new standard for authentication in cyber security beyond the limitations of existing authentication methods. swIDch is an authentication technology expert to help every person and every organization have secure access...
  • 10
    Tesseral

    Tesseral

    Tesseral

    Tesseral is the open source platform for managing identity and access in business software. It provides enterprise-grade capabilities, including SAML single sign-on, SCIM provisioning, role-based access control, managed API keys, and audit logs, implemented in just a few lines of code. Tesseral unifies access management for employees, customers, services, and AI agents, giving organizations the flexibility to adapt to any deployment model and the authority to enforce security policies...
    Starting Price: $0
  • 11
    Sima

    Sima

    Active Witness

    Sima does more than just keep the bad guys out. Sima is a highly secure yet frictionless cloud-based Access Control reader. Sima has the ability to read both mobile credentials (QR codes) and facial biometrics. This allows the integrated cloud-based software to issue both single (QR only) and multi-factor (facial verification) for highly secure and customized facility access. We take your privacy very seriously. We use facial recognition technology to perform facial authentication. This allows...
    Starting Price: Free
  • 12
    Oloid

    Oloid

    Oloid

    Retrofit your workplace with modern access control. Flexible options to choose from, face, Bluetooth, or QR code. Easy retrofit with existing badge readers and access control systems. Secure your assets with contactless biometrics & tailgating detection. Turn iPhones, iPads, Android Phones, or tablets into smart readers. Oloid prevents unauthorized access and reduces dependence on manual entry procedures. We support integration with your existing IT systems for a seamless experience. Employees...
  • 13
    Authsignal

    Authsignal

    Authsignal

    Authsignal is a B2C consumer authentication and identity platform. Built to enable enterprise and mid-market business product and engineering teams the rapid capabilities to deploy omnichannel authentication and verification flows. Engineered to drop into existing architecture, Authsignal delivers the world's fastest path to uplifting and implementing passkeys and risk-based multi-factor authentication (MFA) flows without the need to overhaul your current identity stack, with seamless...
    Starting Price: $349 USD Per Month
  • 14
    GateKeeper Enterprise

    GateKeeper Enterprise

    Untethered Labs, Inc.

    Passwordless, proximity login to PCs, Macs, websites, and desktop applications. Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key. Once a user walks away, the computer will lock, blocking...
    Starting Price: $3/user/month
  • 15
    Auth Armor

    Auth Armor

    Auth Armor

    Harness the power of biometrics on smartphones to make authentication easy for any application or website, creating a new approach to logging and authenticating online. Passwordless and 2-factor authentication that lets you authenticate your users with the smartphones in their pockets. Auth Armor puts secure authentication in the hands of every user — no weak passwords or cumbersome codes. We have built powerful APIs, SDKs, libraries, and dashboards to allow you to build what you want to build...
    Starting Price: FREE for 10,000 active users!
  • 16
    IBM Application Gateway
    As organizations modernize their identity and access management solutions, legacy applications are often abandoned due to a lack of funding and time or the ability to modify existing application authentication flows. Extends your modern advanced authentication capabilities, such as passkeys, to legacy applications with no-code integrations. Allows enterprises to create a consistent user experience across all applications. Creates an integrated view of user flows to help reduce risk and improve...
  • 17
    Routee

    Routee

    AMD Telecom

    Routee is an intelligent omnichannel communication platform (CPaaS) offering advanced Web and API automation for all industries worldwide. Powered by AMD Telecom’s robust infrastructure, Routee's services enable businesses to optimize their marketing & business processes. -SMS Marketing: tailor-made messages based on customers' individual preferences -Email Marketing: personalized newsletters & email campaigns based on an audience's behavioral data -Transactional Email: automated emails...
    Starting Price: $0.01 one-time fee
  • 18
    FusionAuth

    FusionAuth

    FusionAuth

    ..., framework, or architecture. Every capability is API-first and built for extensibility, so you can tailor authentication workflows without getting locked into rigid, inflexible systems. FusionAuth supports all the key use cases — user registration, multi-factor authentication (MFA), passwordless login, role-based access control, and more — while helping you stay compliant with GDPR, HIPAA, PCI, and other regulatory standards.
    Leader badge
    Starting Price: $0
    Partner badge
  • 19
    Ondato

    Ondato

    Ondato

    Ondato is a tech company that streamlines KYC and AML-related processes. We're providing advanced technological solutions for digital identity verification, business customer onboarding, data validation, fraud detection, and more. All of them meet the highest quality standards available for KYC online or offline onboarding for all business and customer types orchestrated from a single interface. We're turning compliance into a business benefit by creating a safer environment for...
    Starting Price: €149.00/month
  • 20
    Next Identity

    Next Identity

    Next Reason

    Next Identity is a comprehensive Customer Identity and Access Management (CIAM) platform designed to help businesses create secure, flexible, and seamless customer journeys. It offers features such as passwordless authentication, multi-channel communication, and unified account management to streamline onboarding and improve customer experience. Next Identity enables businesses to manage millions of users with scalable security, modern orchestration, and advanced analytics, all while...
    Starting Price: $29/month
  • 21
    HYPR

    HYPR

    HYPR | The Passwordless Company

    HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and...
    Starting Price: $4.00 per user/month
  • 22
    Plurilock DEFEND

    Plurilock DEFEND

    Plurilock Security

    Plurilock DEFEND provides true real-time authentication for the duration of an active computing sessions using behavioral biometrics and the computing devices your employees already use. DEFEND relies on a lightweight endpoint agent and proprietary machine learning techniques to confirm or reject user's identity with very high accuracy based on their console input stream, without authentication steps that are evident to the user. By integrating with SIEM/SOAR, DEFEND can be used to triage...
    Starting Price: $9 per user per month
  • 23
    Entrust Identity as a Service
    Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else...
  • 24
    passbolt

    passbolt

    passbolt

    ... and share passwords programmatically with the JSON API. Automate at scale with Passbolt CLI. Real-time access logs. Privacy is in our DNA, but also in the DNA of European laws (to make sure we don’t change our minds). Passbolt self-hosted source code comes under an AGPL license. Yes, even the commercial version. You are free to audit it, contribute to it, and redistribute it. This is why we have a healthy community of thousands of organizations in all sectors.
    Starting Price: €45/month/10 users
  • 25
    LoginTC

    LoginTC

    Cyphercor

    ... codes, and more. LoginTC was built with the principle that administrators are users too, and offers a solution that's not just easy for end users day-to-day, but is also simple for administrators to manage and setup. In fact, if you aren't set-up in one hour, the first month of your subscription is on us. LoginTC can help you reduce your insurance costs and meet compliance regulations with ease.
    Starting Price: $3/month/user
  • 26
    Cisco Duo
    Cisco Duo is a cloud-based identity security solution that protects organizations from identity-based threats and boosts workforce productivity. Trusted by over 40,000 organizations worldwide, Duo delivers an exceptional access management experience across all users, devices, and applications, making access to resources secure, seamless, and easy. Duo with Cisco Identity Intelligence provides deep visibility across your identity ecosystem, adding a powerful security layer to any identity...
    Leader badge
    Starting Price: $3 per user per month
  • 27
    Allthenticator

    Allthenticator

    Allthenticate

    Allthenticator is a passwordless authentication platform designed to unify digital and physical access through a single smartphone-based identity. It enables proximity-based login to computers, websites, and servers, while also unlocking physical doors with the same device—eliminating passwords, tokens, and keycards. The platform supports SSH key signing, passkey logins, OTP management, and native integrations with identity providers like Azure AD and Okta. Admins manage everything from...
    Starting Price: $12/month/user
  • 28
    Intrinsic ID

    Intrinsic ID

    Intrinsic ID

    Intrinsic ID is the world’s leading digital authentication company, providing the Internet of Things with hardware-based root-of-trust security via unclonable identities for any IoT-connected device. Based on Intrinsic ID’s patented SRAM PUF technology, the company’s security solutions can be implemented in hardware or software. Intrinsic ID security, which can be deployed at any stage of a product’s lifecycle, is used to validate payment systems, secure connectivity, authenticate sensors...
  • 29
    SafeNet Trusted Access
    SafeNet Trusted Access, Identity-as-a-Service. SafeNet Trusted Access is a cloud-based access management solution that makes it easy to manage access to both cloud services and enterprise applications with an integrated platform combining single sign-on, multi-factor authentication and scenario-based access policies. Businesses and organizations looking to accelerate the deployment of cloud services for end users encounter hurdles to efficiently managing online identities and access security...
  • 30
    IronWiFi

    IronWiFi

    IronWiFi

    Cloud-based authentication platform offering Captive Portal and RADIUS as a service. Know who is using your Wi-Fi. Take advantage of your wireless networks to generate revenue and collect visitor data. Control the methods and devices your employees use to connect to your company's network. IronWiFi offers advanced Captive Portal that will help you quickly turn your Wi-Fi into a revenue stream and collect valuable visitor data. You can customize the portal pages to support your brand and fit...
    Starting Price: $5 per user per month
  • Previous
  • You're on page 1
  • 2
  • Next