Results for: swing based visual query builder java code

Suggested Categories:

No-Code Development Platforms
No-code development platforms provide a way for users to design, build, and develop software applications without the need for traditional coding. They are built in such a way that users can rely on simple visual interfaces with drag and drop type tools, allowing them to rapidly develop applications with minimal technical knowledge. This makes no-code development platforms ideal for any user regardless of programming experience, from hobbyists to entrepreneurs. Furthermore, modern no-code platforms allow complex mobile apps or web projects to be created more quickly than ever before.
QR Code Generators
QR code generators are tools that allow users to create quick response (QR) codes, which are machine-readable barcodes that store information such as URLs, text, contact details, or Wi-Fi credentials. These tools typically allow users to customize QR codes by changing their size, color, and design while ensuring the code remains scannable. QR code generators are commonly used for marketing, event registration, payments, product packaging, and contactless interactions. They help businesses and individuals provide an easy way for users to access digital content or services through their smartphones or other scanning devices.
Code Collaboration Tools
Code collaboration tools are platforms that enable developers to work together on software projects by facilitating real-time collaboration, version control, and code sharing. These tools allow multiple developers to edit and review code simultaneously, track changes, and manage different versions of code through branches and commits. Key features typically include code reviews, pull requests, conflict resolution, issue tracking, and integration with version control systems like Git. Code collaboration tools are essential for team-based development environments, ensuring smooth coordination and improving productivity in software projects.
Visual Configuration Software
Visual configuration software allows users to create and customize products by visually selecting options and features, making it ideal for industries like manufacturing, retail, and custom products. These platforms provide an interactive interface where customers or users can configure products by choosing colors, sizes, materials, and other specifications, all in real time. The software typically includes 3D models or visual representations of the product to give users an accurate view of their customizations. Visual configuration software often integrates with e-commerce platforms, product management systems, and order fulfillment processes, ensuring a seamless experience from design to delivery.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Coding Challenge Platforms
Coding challenge platforms, also known as code assessment and technical skills testing platforms, enable developers and organizations to test their coding skills to see what skills need to be improved, or to determine the coding skills of a potential hire. Many coding challenge platforms also offer features like coding competitions, mock interviews, and collaboration opportunities for learning with others. These platforms are popular among job seekers, developers, and coding enthusiasts looking to enhance their problem-solving abilities.
Data Visualization Software
Data visualization software helps converting numeric and textual data into visual tools and performance dashboards in order to identify and analyze possible patterns.
Home Builder Software
Home builder software facilitates the monitoring of home-building projects, their progress, scheduling and costs, while providing customer management tools.
Website Builder Software
Website builders are tools that allow users to create websites without coding. These platforms provide a range of features and tools, such as drag-and-drop design elements, hosting, and domain registration. Website builders have become popular due to their ease-of-use and cost savings compared to hiring a professional web developer or designer. They are also typically well supported with step-by-step tutorials and customer service options for those who need help getting started.
Code Editors
Code editors are software tools that allow developers to write, edit, and debug source code for programming and web development. These editors provide essential features like syntax highlighting, code completion, auto-indentation, and error detection to enhance productivity and reduce coding errors. Many code editors also offer integrations with version control systems (like Git), debuggers, and build tools, allowing developers to manage their code and workflows efficiently. While some code editors are lightweight and focused solely on text editing, others offer extensive features and customization options through plugins and extensions. By providing a streamlined environment for coding, code editors are essential for software development, web development, and scripting tasks.
Visual Project Management Software
Visual project management software enables teams and project managers to visually plan and track progress of projects.
Infrastructure as Code Software
Infrastructure as Code (IaC) tools are software solutions that enable developers and IT teams to automate the provisioning, configuration, and management of infrastructure using code. These tools allow users to define and manage infrastructure components like servers, databases, and networking resources through configuration files, ensuring consistency and repeatability in infrastructure setups. IaC tools typically support version control, enabling teams to track changes and collaborate on infrastructure management.
Code Search Engines
Code search engines are specialized search tools that allow developers to search through codebases, repositories, or libraries to find specific functions, variables, classes, or code snippets. These tools are designed to help developers quickly locate relevant parts of code, analyze code quality, and identify reusable components. Code search engines often support various programming languages, providing search capabilities like syntax highlighting, filtering by file types or attributes, and even advanced search options using regular expressions. They are particularly useful for navigating large codebases, enhancing code reuse, and improving overall productivity in software development projects.
Online Form Builders
Online form builders enable the creation of fillable forms through a drag-and-drop interface in order to be embedded or shared on web pages.
Code Enforcement Software
Code enforcement software is software that helps local government agencies and municipalities manage and enforce building codes, zoning laws, and other regulatory compliance requirements. These platforms typically provide features for tracking violations, issuing citations, managing inspections, and automating the code enforcement process. Code enforcement software can also include tools for scheduling inspections, documenting findings, generating reports, and managing case histories. It helps ensure that properties comply with local laws and ordinances, improving efficiency and accountability in enforcement processes. Additionally, it allows for better communication between enforcement officers, residents, and other stakeholders.
Revenue-Based Financing Companies
Revenue-based financing companies, also known as royalty-based financing companies, are companies that provide financing to businesses with predictable revenue streams. Revenue-based financing firms provide upfront capital in exchange for a percentage of top line revenue, or a fixed percentage of each contract. Revenue-based financing solutions are ideal for companies with predictable, recurring revenue such as SaaS companies, ecommerce retailers, subscription businesses, and more.
Account-Based Advertising Software
Account based advertising software is used by businesses and marketers to improve customer engagement through the use of targeted and personalized digital ads.
Usage-Based Billing Software
Usage-based billing software, also known as metered billing software, enables companies to charge their clients and customers based on their usage, rather than one-time fees or flat subscription rates. Usage-based billing systems provide companies with the ability to offer pricing models based on metered billing, and also offer usage and consumption statistics.
Account Based Marketing Software
Account based marketing software is a technology solution that enables businesses to target and engage specific accounts or customer segments. This software typically provides features such as segmentation, personalized content, account profiles and customer intelligence. It helps marketers identify the right audiences and deliver relevant messages to boost brand awareness and increase sales.
AI Coding Assistants
AI coding assistants are software tools that use artificial intelligence to help developers write, debug, and optimize code more efficiently. These assistants typically offer features like code auto-completion, error detection, suggestion of best practices, and code refactoring. AI coding assistants often integrate with integrated development environments (IDEs) and code editors to provide real-time feedback and recommendations based on the context of the code being written. By leveraging machine learning and natural language processing, these tools can help developers increase productivity, reduce errors, and learn new programming techniques.
View more categories (20) for "swing based visual query builder java code"

82 Products for "swing based visual query builder java code" with 2 filters applied:

  • 1
    Voicekey

    Voicekey

    Voicekey

    Voicekey is a patented voice biometrics product using stateless Neural Network (NN) Technology/AI to help solve non-face-to-face identity authentication and identification security challenges. Voicekey is at’ heart’ a computational NN/AI engine that is consumed on-device or server based as part of an identity security application. Voicekey processes involved in enrolment and verification are consumed and accessed on-device or server based using an SDK depending on the platform (Java, i...
  • 2
    LoginID

    LoginID

    LoginID

    With just a few lines of code, LoginID enables websites and apps to integrate FIDO/FIDO2 certified multi-factor authentication via our easy to use SDKs and APIs. Our platform leverages the biometrics on the end user's device to create a private key, public key pair that allows for seamless strong customer authentication. No app installation is required and the private key is stored securely on the end user's device, never leaving. Additionally, LoginID offers Transaction Confirmation, where...
    Starting Price: Free
  • 3
    IriMaster

    IriMaster

    Iritech, Inc.

    ... transactions and data exchange using SSL and WS‑Security standards, and ensures device‑level encryption via a PKI‑based security infrastructure. Its Web Service API enables scalable, service‑oriented deployments, supporting clients in Java, .NET, or web applications. The software delivers high availability through application server clustering and hardware redundancy, and scales from single‑PC setups to distributed server networks with load balancers.
  • 4
    EasySecure

    EasySecure

    EasySecure

    Grant access to a user at the push of a button. Easily determine who may enter where and when, and view who has entered where and when. Compose the ideal situation. Registration is possible with a mobile phone, finger, face, QR, card, code and/or license plate. No unnecessary repetition of the same administrative actions, save time and experience more control. As soon as someone leaves employment, access is also automatically blocked. Role-based and scalable. Manage access control for one...
  • 5
    Secfense

    Secfense

    Secfense

    ... in between your users and the applications they access. It learns the traffic patterns related to authentication. It can then enforce multi-factor authentication login and other sensitive actions without interfering with the applications existing code or database. Up-to-date 2FA methods are always available on the platform. Application changes don’t affect Secfense and applied methods. Take control over session expiration rules across all apps. Don’t rely on VPNs, base trust on users and their devices.
  • 6
    It'sMe

    It'sMe

    Acceptto

    ... and continues authenticating post-authorization. We prevent account takeovers, even if hackers have already acquired passwords. ItsMe™ Intelligent Multi Factor Authentication (MFA) increases your security by authorizing access attempts to a registered device in real-time, be it through a push notification or verification code (SMS, TOTP, email, and etc.). With our timed based one-time password (TOTP), security key, or biometric options, you can authenticate access even when offline.
  • 7
    TypingDNA

    TypingDNA

    TypingDNA

    A smarter, user-friendly authentication that replaces SMS 2FA codes, reducing costs by an order of magnitude. Protect user accounts with powerful typing biometrics analysis, accurately and passively. Available anywhere people type, with a flexible API and low-code integration. TypingDNA records typing biometrics data, also known as keystroke dynamics. The data consists of timings and durations of various key press events. Every new user enrolls typing patterns to store a baseline...
    Starting Price: $ 0.2 per user per month
  • 8
    Veridium

    Veridium

    Veridium

    Veridium is the most comprehensive Integrated Identity Platform powered by AI-based Behavioral Biometrics, enabling Multi-Factor Authentication (MFA), digital ID verification, and a true enterprise-grade passwordless experience for employees and customers. Low code, agile, and flexible. Eliminating the password for customers removes the friction often associated with passwords and delivers increased security for online connections with our single step multi-factor authentication solution, while...
  • 9
    CloudScanr

    CloudScanr

    M2SYS Technology

    CloudScanr™ is a biometric scanner integration service based on a service-oriented architecture. This product eliminates the headache associated with integrating biometric hardware into Windows applications and various Web browsers. With the advent of this product, developers do not have to worry about ActiveX, native code integration and browser plug-ins. Our goal is to provide you with the flexibility to customize and configure your biometric identification management project in a way...
  • 10
    Microblink

    Microblink

    Microblink

    ... time to new fraud patterns, ensuring resilience against synthetic and deepfake-based attacks. Flexible deployment options—including API, SDK, and no-code interfaces—enable seamless integration across industries and geographies. With unmatched accuracy and adaptability, Microblink helps businesses build lasting digital trust across customer onboarding, authentication, and compliance workflows.
  • 11
    Auth Armor

    Auth Armor

    Auth Armor

    Harness the power of biometrics on smartphones to make authentication easy for any application or website, creating a new approach to logging and authenticating online. Passwordless and 2-factor authentication that lets you authenticate your users with the smartphones in their pockets. Auth Armor puts secure authentication in the hands of every user — no weak passwords or cumbersome codes. We have built powerful APIs, SDKs, libraries, and dashboards to allow you to build what you want to build...
    Starting Price: FREE for 10,000 active users!
  • 12
    FusionAuth

    FusionAuth

    FusionAuth

    ..., framework, or architecture. Every capability is API-first and built for extensibility, so you can tailor authentication workflows without getting locked into rigid, inflexible systems. FusionAuth supports all the key use cases — user registration, multi-factor authentication (MFA), passwordless login, role-based access control, and more — while helping you stay compliant with GDPR, HIPAA, PCI, and other regulatory standards.
    Leader badge
    Starting Price: $0
    Partner badge
  • 13
    Ondato

    Ondato

    Ondato

    Ondato is a tech company that streamlines KYC and AML-related processes. We're providing advanced technological solutions for digital identity verification, business customer onboarding, data validation, fraud detection, and more. All of them meet the highest quality standards available for KYC online or offline onboarding for all business and customer types orchestrated from a single interface. We're turning compliance into a business benefit by creating a safer environment for...
    Starting Price: €149.00/month
  • 14
    Preventor

    Preventor

    Preventor

    Preventor is an all-in-one SaaS platform that streamlines digital onboarding, compliance, and core banking operations. It supports eKYC/eKYB with biometric ID verification, global document coverage, electronic signatures, and customizable workflows. Preventor includes real-time AML sanctions screening, PEP/adverse media checks, transaction monitoring, risk scoring, and case management. It also features a core banking engine with account origination, e-banking, and full lifecycle support for...
  • 15
    cidaas

    cidaas

    WidasConcepts

    cidaas is the optimal solution for fast and secure identity management. Thanks to cidaas you create one identity per user across all your channels. cidaas is based on OAuth2.0 and OpenID Connect standards, provides strong API security and with integrated Bot Net Detection and Fraud Detection a secure journey across all your business channels. Modern Identity and Access Management goes like this. Comprehensive feature set for quick and easy integration and implementation of all use cases...
  • 16
    HYPR

    HYPR

    HYPR | The Passwordless Company

    HYPR fixes the way the world logs in. Organizations are faced with the challenge of achieving secured and seamless authentication coupled with a flawless user experience at a time when it’s more critical than ever. HYPR’s passwordless multi-factor authentication (PMFA) platform decouples authentication from the organization’s current and future identity providers and eliminates the traditional trade-off between security and user experience by providing uncompromising assurance and...
    Starting Price: $4.00 per user/month
  • 17
     M2SYS eGov

    M2SYS eGov

    M2SYS Technology

    M2SYS eGov is a no-code platform that system integrators can configure for any government digitization project globally. It connects all biometric and third-party systems with easily customized applications to create complete end-to-end solutions and works with popular biometric hardware and matching engines.
  • 18
    Biometric Vision

    Biometric Vision

    Biometric Vision

    Developers, businesses and system integrators upgrade your facial recognition applications performance with a few lines of code whilst preserving your customer’s privacy. Integrate with Biometric Vision’s next generation AI-powered algorithm in minutes and increase the accuracy, speed and performance of your facial recognition apps. 99.99% accuracy in the most challenging of conditions. A 0.006% error rate tested against 1 million ethically sourced face images. AES-256+ end-to-end encryption...
    Starting Price: $29 per month
  • 19
    DigitalPersona

    DigitalPersona

    HID Global

    Go Beyond Multi-factor Authentication with DigitalPersona® software. Expand to risk-based factors, secure every application, offer frictionless access and deploy quickly. Enhance security with industry leading biometric solutions. Simplify processes, speed queues and confirm identities for a range of critical citizen, criminal justice and military applications. Select from an array of U.are.U® readers, modules and sensors. Leading fingerprint technologies to meet your specific OEM, retail...
  • 20
    Touch N Go

    Touch N Go

    Bayometric

    Touch N Go – a fast, secure & simple way to integrate biometric fingerprint identification into your solution with just FOUR lines of code. A scalable, reliable and high performing biometric identification solution for seamless integration. Makes implementing and maintaining fingerprint recognition easy with no learning curve for developers. Provides best fit identity solution for workflows with demanding security that keeps developers happy and productive and IT satisfied and in control...
  • 21
    Entrust Identity as a Service
    Cloud-based identity and access management (IAM) solution with multi-factor authentication (MFA), credential-based passwordless access, and single sign-on (SSO). Secure access to apps, networks, and devices for all of your users — with cloud-based multi-factor authentication. Proximity-based login, adaptive authentication and other advanced features contribute to an optimal user experience. Happy users don’t try to circumvent security measures. Everyone wins. This is easier than anything else...
  • 22
    RECOGNITO

    RECOGNITO

    RECOGNITO

    RECOGNITO is a global leader and trusted provider of Face Biometrics and ID Document Verification solutions that are fully optimized for usability, security, and privacy. Recognito SDK is the world's leading face-based identity verification solution with NIST FRVT Top Algorithm. - Product • Face Recognition SDK: 🏆 NIST FRVT Top 1 Face Recognition Algorithm • Face Liveness Detection SDK: DeepFake Detectable, 2D/3D Liveness Detection Algorithm • ID Document Verification SDK: ID...
    Leader badge
    Starting Price: Free
  • 23
    BioCatch

    BioCatch

    BioCatch

    BioCatch delivers advanced behavioral insights to provide global organizations with actionable intelligence so you can create a secure customer journey. BioCatch analyzes a user's physical and cognitive digital behaviors to generate insights that distinguish between legitimate applicants and cybercriminals. BioCatch detects behavioral anomalies indicative of human and non-human cyberthreats such as Remote Access Tools attacks, Bots, malware and manual account takeover methods. BioCatch...
  • 24
    Callsign

    Callsign

    Callsign

    We are an identity fraud, authorization & authentication company, solving the challenges that organizations face in getting their users on to & interacting with their digital platforms. Often innovative solutions focus on the capability of technology and do not give applicability to a user base the same weighting. Our engineering team comes from a banking and ecommerce background, with over 300 years combined experience in making software work for all. That’s why we are chosen to help some...
  • 25
    Precise BioMatch

    Precise BioMatch

    Precise Biometrics

    Precise BioMatch is an advanced AI-based fingerprint recognition algorithm designed for secure and convenient identity authentication across various platforms, including mobile devices, laptops, cars, smart door locks, and smart cards. Optimized for high performance in constrained computing environments, it delivers industry-leading biometric accuracy and security. It supports fast, reliable fingerprint verification for diverse applications, ensuring robust user authentication. Precise Bio...
  • 26
    Mitek

    Mitek

    Mitek Systems

    ... businesses reduce financial losses by preventing account takeover and synthetic identity fraud while ensuring compliance with regulatory mandates such as KYC and AML. The company’s user-friendly no-code platform accelerates deployment and boosts customer confidence with simple, secure user experiences. Trusted by over 7,900 organizations worldwide, Mitek continues to innovate in identity verification and fraud defense.
  • 27
    V-OS Face Biometrics and eKYC
    ... and cryptographic processes can be executed in isolation from the rest of the mobile app. V-OS App Protection solution can detect and protect the mobile app from threats, such as reverse-engineering, hooking, tampering, app integrity checks, library signature validation, code-injection, debugging and more. In an insecure OS environment when the phone is compromised, apps integrated with V-OS Application Protection have rooted and jailbreak detection mechanisms that allows a mobile app to run smoothly.
  • 28
    ThumbSignIn

    ThumbSignIn

    ThumbSignIn

    Any channel, any device – we’ve got you covered. Choose from our suite of user-friendly authentication solutions, from 2FA to passwordless biometrics, to find the right authentication for your business and users. Start with 2FA and progress to more advanced technology like biometrics-based authentication to continue improving user experience and security over time. Our SaaS-based authentication service, REST APIs , mobile SDKs and UI widgets deliver a powerful combination of software components...
    Starting Price: $3 per user per month
  • 29
    Nymi

    Nymi

    Nymi

    A connected workforce is transformed with safe, secure, and simple applications. Transform access across the enterprise with biometrics, Zero Trust, and nonrepudiation made easy on one secure workplace wearable. Sign off on critical processes with stronger data integrity and identity assurance. Our standards-based approach and vast partner network means we connect to your existing infrastructure. Nymi’s workplace wearable, the Nymi Band, provides organizations with a platform to achieve zero...
  • 30
    SentryPoint Security Suite
    Biometrics-based security, such as fingerprint authentication, is proven to be both more secure and convenient than passwords, making fingerprint sensing an increasingly common, and product-differentiating, feature in smartphones, tablets and PCs. However, fingerprint authentication also raises security concerns that can best be addressed with protections purpose-built for biometrics. Synaptics helps ensure biometric data protection through the SentryPoint Security Suite of features...
  • Previous
  • You're on page 1
  • 2
  • 3
  • Next