Results for: java netbeans object-oriented forms

Suggested Categories:

Object Storage Solutions
Object storage solutions are systems designed to store large amounts of unstructured data, such as multimedia files, backups, logs, and archives, in a highly scalable and accessible manner. These platforms break data into individual objects, each containing the data itself, metadata, and a unique identifier, which makes retrieval and management more efficient. Object storage is typically used for cloud storage environments, where flexibility, scalability, and redundancy are key. It allows organizations to store vast amounts of data with high durability, often offering features like automated data tiering, access controls, and encryption. Object storage solutions are ideal for businesses that need cost-effective, scalable, and secure storage for large datasets or growing volumes of unstructured data.
Forms Automation Software
Forms automation software is a type of software used to streamline various organizational processes. It can help automate the creation and distribution of forms, as well as the collection and analysis of data from those forms. It typically includes features such as search capabilities, integration with other systems, automated notifications, and customizable templates. These tools can help organizations save time and money by reducing manual tasks associated with form processing.
Online Form Builders
Online form builders enable the creation of fillable forms through a drag-and-drop interface in order to be embedded or shared on web pages.
Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
Form Analytics Software
Form analytics tools allow website owners to track, monitor, manage and analyze visitor interactions with web forms.
Message-Oriented Middleware
Message-oriented middleware (MOM) is software that provides an interoperable interface between multiple applications. It enables applications to communicate with one another, regardless of their underlying technologies. Applications using MOM can send and receive messages across a variety of networks and transport protocols such as HTTP, TCP/IP, and SMTP. These messages can be either synchronous or asynchronous, allowing for real-time interactions or delayed messaging without the need for complex programming code. MOM also facilitates remote access through a centralized system making it easier to manage in distributed environments. Additionally, since it is independent of the application architecture, MOM offers increased flexibility when integrating different platforms together.
AI Object Removers
AI object removers are software tools that identify and remove objects from digital images. They use machine learning techniques to accurately detect a specific object or set of objects, such as people, cars, buildings, trees, and plants. Once identified, the algorithm will then delete the object from the image without altering any other information. This technology can be used for various applications including removing unwanted persons and objects from photos or videos.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
Data Lake Solutions
Data lake solutions are platforms designed to store and manage large volumes of structured, semi-structured, and unstructured data in its raw form. Unlike traditional databases, data lakes allow businesses to store data in its native format without the need for preprocessing or schema definition upfront. These solutions provide scalability, flexibility, and high-performance capabilities for handling vast amounts of diverse data, including logs, multimedia, social media posts, sensor data, and more. Data lake solutions typically offer tools for data ingestion, storage, management, analytics, and governance, making them essential for big data analytics, machine learning, and real-time data processing. By consolidating data from various sources, data lakes help organizations gain deeper insights and drive data-driven decision-making.
Patient Intake Software
Patient intake software streamlines the process of collecting and managing patient information before or during their visit to a healthcare facility. It automates the registration process by enabling patients to submit personal details, medical history, insurance information, and consent forms digitally. This reduces paperwork, minimizes errors, and speeds up check-in times for a smoother patient experience. The software often integrates with electronic health records (EHR) and practice management systems to ensure seamless data flow and improved accuracy. By optimizing intake workflows, it helps healthcare providers focus more on patient care and less on administrative tasks.
Waiver Software
Waiver software helps businesses and organizations create, manage, and store electronic waivers and consent forms for customers or participants. These platforms typically include tools for customizing waiver templates, capturing digital signatures, and storing waivers securely in compliance with legal and regulatory requirements. Waiver software often integrates with mobile devices and websites, allowing customers to sign forms online or on-site using tablets or smartphones. By using this software, businesses can streamline the waiver process, reduce paper handling, and improve the efficiency of collecting necessary legal documentation.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Onboarding Software
Onboarding software is software used to facilitate and streamline the process of bringing new employees into a business. It helps employers collect, store, and process employee information quickly and efficiently. It can help with generating onboarding plans for each individual hire, setting up training sessions or tasks to complete, ensuring compliance with legally-required documents such as tax forms, allowing access to relevant company resources like company policies and procedures documents, and providing ongoing support after the onboarding process has been completed. Onboarding software also helps businesses save time by automating much of the detail work involved with hiring new staff members. These tools are used across various industries to ensure that each employee's onboarding experience is as smooth as possible.
OKR Software
OKR software is a tool used to help track and manage organizational objectives and key results. It provides the ability to create, assign, collaborate on, review, and report on objectives and key results across an organization. OKR software can be used to keep the organization's goals aligned with its overall strategy while providing transparency around progress being made. OKR implementation has been shown to foster team engagement, collaboration, goal alignment, performance management capabilities, and accountability across organizations of all sizes.
Columnar Databases
Columnar databases, also known as column-oriented databases or column-store databases, are a type of database that store data in columns instead of rows. Columnar databases have some advantages over traditional row databases including speed and efficiency.
Computer Vision Software
Computer vision software allows machines to interpret and analyze visual data from images or videos, enabling applications like object detection, image recognition, and video analysis. It utilizes advanced algorithms and deep learning techniques to understand and classify visual information, often mimicking human vision processes. These tools are essential in fields like autonomous vehicles, facial recognition, medical imaging, and augmented reality, where accurate interpretation of visual input is crucial. Computer vision software often includes features for image preprocessing, feature extraction, and model training to improve the accuracy of visual analysis. Overall, it enables machines to "see" and make informed decisions based on visual data, revolutionizing industries with automation and intelligence.
Software-Defined Storage (SDS)
Software-Defined Storage (SDS) is a storage architecture that separates the software control layer from the physical storage hardware, allowing organizations to manage storage resources — like capacity, performance, replication, and provisioning — through a unified software layer rather than being locked into specific hardware arrays. These solutions pool storage across commodity servers or diverse storage devices and abstract them into flexible, dynamic storage services. SDS enables policy-based automation, easier scalability, hardware vendor independence, and rapid provisioning. It supports block, file, and object storage interfaces and is well suited for hybrid cloud, edge, and modern data-driven environments. Ultimately, SDS empowers IT teams to treat storage as a programmable resource, reduce costs, increase agility, and adapt quickly to changing data demands.
NoSQL Database
NoSQL database software provides the tools to store, capture and retrieve of big data through the use of non tabular databases.
View more categories (20) for "java netbeans object-oriented forms"

52 Products for "java netbeans object-oriented forms" with 3 filters applied:

  • 1
    DexGuard

    DexGuard

    Guardsquare

    ...It enables you to fully protect your application or SDK without requiring you to share or alter the source code. DexGuard offers built-in support for both native Android (Java, Kotlin) and cross-platform applications (Cordova, Ionic, React Native, Unity). DexGuard’s functionality can be extended with the NDK add-on to process and protect native libraries.
  • 2
    Provision

    Provision

    Provision

    ...Consequentially, these organizations are exposing themselves to more digital risk. We are offering end-to-end management and security tools for cybersecurity risk, third-party risk, business continuity risk, data privacy risk and other forms of digital risk add to the uncertainty of achieving business objectives. We’ll assess your current infrastructure and will recommend suitable solutions that can fill in those gaps.
  • 3
    ManageEngine ADAudit Plus
    ADAudit Plus helps keep your Windows Server ecosystem secure and compliant by providing full visibility into all activities. ADAudit Plus provides a clear picture of all changes made to your AD resources including AD objects and their attributes, group policy, and more. AD auditing helps detect and respond to insider threat, privilege misuse, and other indicators of compromise, and in short, strengthens your organization's security posture. Gain granular visibility into everything that resides in AD, including objects such as users, computers, groups, OUs, GPOs, schema, and sites, along with their attributes. ...
    Starting Price: $595.00/year
    View Software
    Visit Website
  • 4
    personalDNSfilter

    personalDNSfilter

    Zenz Solutions

    personalDNSfilter is a DNS filter proxy written in Java that intercepts domain name resolutions and returns the loopback address for filtered hosts. It supports secure DNS via DNS over HTTPS (DoH) and DNS over TLS (DoT) and is available for Java-enabled devices. The application operates with minimal memory usage, allowing filtering with millions of hosts while consuming only a few megabytes of RAM.
    Starting Price: Free
  • 5
    Files.com

    Files.com

    Files.com

    6,000+ companies trust Files.com to automate and secure business critical transfers. We obsess about security, compliance, reliability, and performance so your critical business processes just work every time. Easily manage any transfer flow without writing scripts or code, and onboard workloads and partners effortlessly. We support standard file transfer protocols (FTP, SFTP, AS2) for working with external partners and also provide native apps for high performance internal...
  • 6
    DashO

    DashO

    PreEmptive

    ...We invest in threat and protection research so you don't have to, and we constantly update our protection to stay ahead of the arms race. Protecting your app shouldn't require an army of consultants. You can make your first protected build for Android, Web, or Java in just a few minutes, in whatever build environment you use. Our customers love our support, and consistently give it the highest ratings. Whether you're protecting a mature app that's facing new risks or a new app that you haven't released yet, DashO has you covered. Application development teams face an ever-growing set of security threats as apps become more central to business and attackers grow in sophistication. ...
  • 7
    MoQuality

    MoQuality

    MoQuality

    ...Generates visual test reports to assist with triaging and test maintenance. Enables advanced functionality over Appium open-source. Write your Appium tests in Python, Java, JavaScript (wd/webdriverio). Build and debug your Appium script on the fly with MoQuality. Run the tests locally on real devices, emulators, and simulators. Test reports are the results of test runs that are saved by the user. You can run your Appium tests locally as many times as you wish. MoQuality supports most Android and iOS real devices, emulators and simulators. ...
    Starting Price: $25 per month
  • 8
    RoboForm

    RoboForm

    Siber Systems

    RoboForm securely stores all of your passwords and logs you in with a single click (or tap). Save time entering personal and billing information with AutoFill for long web forms. RoboForm's random password generator will create a strong and unique password for each site. Say goodbye to using weak or duplicate passwords for everything. Securely share Login information with other RoboForm users.
  • 9
    Protectstar Micro Guard
    ...Every attempted security breach will be reported. To maintain usability, choose which apps on your devices can access the microphone to take calls and record with ease and privacy orientated. With the Deep Detective, we have created an intelligent and versatile detective that observes all accesses. Deep Detective permanently controls which process or program currently attempts to access the microphone. Additionally, it reports known, and thanks to modern heuristic methods, also unknown attack attempts. We developed the app Camera Guard to block and protect your camera easily.
    Starting Price: $8.90 per year
  • 10
    Themis

    Themis

    Cossack Labs

    ...Zero-knowledge proof-based protocol to compare secrets over non-trusted channels without risking leaks or reuse attacks. Use Secure Comparator for authenticating the users in a way that no password (or password hash) is sent over the network. Secure Session is a session-oriented encrypted data exchange with forward secrecy for better security guarantees and more demanding infrastructures.
    Starting Price: $0.01
  • 11
    BrandShield

    BrandShield

    BrandShield

    ...Monitor marketplaces and websites to remove counterfeits and increase your revenues and reputation. Protect your brand from TM infringements, counterfeit sales and brand abuse. BrandShield is a brand-oriented digital risk protection company, that specializes in monitoring, detection, and removal of digital threats such as phishing attempts, executive impersonation, counterfeit products, trademark infringements, and more. BrandShield was established to revolutionize the way companies can protect their digital assets outside their security perimeter. ...
  • 12
    AUTHADA

    AUTHADA

    AUTHADA

    ...With a growing team of over 30 motivated employees, AUTHADA continuously develops its solutions, adapting them individually to customer needs. The company emphasizes trust, innovation, and solution orientation, both within the team and externally. AUTHADA's services include online identification, digital signatures, and on-site identification, all designed to provide secure and efficient digital processes. The ID data and the signed documents are transferred to the service provider in the last step. The branch employee uses the app to capture the customer’s ID card documents.
    Starting Price: Free
  • 13
    Nxt

    Nxt

    Jelurida Swiss

    Nxt is an open source blockchain platform and the first to rely entirely on a proof-of-stake consensus protocol. Launched in November 2013 and written from scratch in Java, Nxt is proof that blockchain technology is not only about simple transfer of value but also has the potential to revolutionize many aspects of our lives with the various decentralized applications that can be built with it. Today, Nxt remains one of the most tested and reliable platforms in the industry, influencing numerous other projects. ...
  • 14
     ThumbmarkJS

    ThumbmarkJS

    ThumbmarkJS

    ThumbmarkJS is a fair, privacy-friendly fingerprinting library built by developers for developers. Offered under an MIT license, it can be installed via NPM or loaded from jsDelivr, and with just a few lines of JavaScript, importing the UMD bundle and calling tm.get(), it returns a consistent 32-character thumbmark fingerprint. For small projects requiring higher accuracy, a free API version is available, while the Pro version scales indefinitely and cost-efficiently for large-scale applications. Without complex setup or invasive tracking, ThumbmarkJS has been integrated into over 60,000 websites, handling more than 1 billion identifications and 200 thousand downloads per month. ...
    Starting Price: €15 per month
  • 15
    Auth0

    Auth0

    Okta

    Auth0 takes a modern approach to Identity, providing secure access to any application, for any user. Safeguarding billions of login transactions each month, Auth0 delivers convenience, privacy, and security so customers can focus on innovation. Auth0 is part of Okta, The World’s Identity Company™. Auth0 lets you quickly integrate authentication and authorization for web, mobile, and legacy applications, with new Fine Grained Authorization (FGA) that goes beyond role-based access...
    Leader badge
    Starting Price: Free plan
  • 16
    ManageEngine ADManager Plus
    ADManager Plus is a simple, easy-to-use Windows Active Directory (AD) management and reporting solution that helps AD administrators and help desk technicians in their day-to-day activities. With a centralized and intuitive web-based GUI, the software handles a variety of complex tasks like bulk management of user accounts and other AD objects, delegates role-based access to help desk technicians, and generates an exhaustive list of AD reports, some of which are an essential requirement to satisfy compliance audits. This Active Directory tool also offers mobile AD apps that empower AD admins and technicians to perform important user management tasks, on the move, right from their mobile devices. ...
    Starting Price: $595 per year
  • 17
    4identity
    4identity is the technological solution developed by Bit4id that empowers web applications with Digital Signature and Authentication processes. 4identity does not use Java Applets or any other third party add-on. It is simple, its is compatible with any web browser and works under the most used operating systems. The “integration-less” Engine to add Digital Signature and Strong Authentication to web applications through a simple API. 4identity means usability, providing a “1-click signing” user experience. ...
  • 18
    LoginID

    LoginID

    LoginID

    ...Additionally, LoginID offers Transaction Confirmation, where a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPAA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
    Starting Price: Free
  • 19
    Zebra Enterprise Browser

    Zebra Enterprise Browser

    Zebra Technologies

    ​Zebra's Enterprise Browser is an Android-based industrial browser that enables the development of web-based applications tailored to leverage the full capabilities of Zebra devices. It allows developers to create feature-rich applications using standard web technologies such as HTML5, CSS, and JavaScript, ensuring compatibility across various Zebra devices, including mobile computers, tablets, kiosks, wearables, and vehicle-mounted devices. The browser provides access to Zebra's extensive API library, facilitating seamless integration with device features like barcode scanning, RFID, and cameras. Additionally, Enterprise Browser supports integration with leading Enterprise Resource Planning (ERP) systems, such as SAP, through the Zebra Picking Plus API, enabling real-time updates to backend databases and streamlining operational workflows. ...
    Starting Price: Free
  • 20
    DuskRise

    DuskRise

    DuskRise

    ...The security dashboard provides complete visibility of the offsite networks and allows to enforce office-grade policy controls in the remote environment. The DuskRise solution is powered by the threat intelligence research and data analysis form the Cluster25 team. Mitigate threats through effective control and prevention filters with strong detection and response mechanics. Leverage on our proprietary AI algorithms to filter noisy network data and detect anomalous behavior on the spot. Form a secure network enclave, creating a segment you can own and secure on any network.
    Starting Price: Free
  • 21
    ManageEngine EventLog Analyzer
    ...With network device auditing functionality, it enables users to monitor their end-user devices, firewalls, routers, switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports. EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats.
    Starting Price: $595
  • 22
    iDenfy

    iDenfy

    iDenfy

    ...iDenfy protects startups, financial institutions, gambling, streaming, ridesharing, and other digital services from identity fraud using a three-layer identity verification process. The process protects businesses from the most threatening forms of identity fraud. iDenfy also provides services for business verification, proxy detection, fraud scoring, AML screening and monitoring, NFC verification, and other fraud prevention services. Founded before AML, fraud, and GDPR regulations were put into place, iDenfy pioneered identity verification. The company covers users' ID verification process in full, combining AI-based biometric recognition and manual human checks to ensure they are real users. ...
    Starting Price: €0.5 per verification
  • 23
    Quick License Manager (QLM)

    Quick License Manager (QLM)

    Soraco Technologies

    ...Send email notifications to your customers based on selected triggers. e-Commerce integration to automate the license key generation process with the ordering process. Analytics to understand usage behavior. Self Help portal for your customers. Check for Updates for your application. Trial Registration Form to allow your customers to request a trial license.
    Leader badge
    Starting Price: $200 one-time payment
  • 24
    PeoplePlatform

    PeoplePlatform

    Web Active Directory

    ...Single and Bulk Deprovisioning – remove access of individual users to your organization’s resources. Handle Workflows – Workflow jobs can be set-up to run after an object is provisioned.
  • 25
    Onyxia

    Onyxia

    Onyxia

    Onyxia is a Dynamic Cybersecurity Management platform that empowers Chief Information Security Officers and cybersecurity leaders with a centralized view of their cybersecurity environment and provides actionable insights for high-performing cyber defense strategies that align with business objectives. With Onyxia, security leaders can easily measure, manage and convey the business value of their cybersecurity program, enabling their organizations to stay safe from emerging threats, focus on what matters, and make smarter and more efficient decisions. The Onyxia platform identifies gaps in cybersecurity management and prioritizes recommendations for proactive cybersecurity strategy. ...
  • 26
    Everykey Vault
    Everykey is a B2B cybersecurity solution in the form of mobile app that streamlines the generation and management of secure passwords, in addition to access management, all using military-grade encryption to safeguard devices.
  • 27
    SAFE

    SAFE

    Safe Security

    ...This means they have 12 dashboards to tell them what’s going wrong and no place to aggregate all of them. Most cybersecurity product purchases fail to justify an objective ROI. A clear difference in the delta change of the organization's cyber resilience from its “before” to “after” implementation state of the product is missing. There is also no industry standard to measure the quality of the implementation of cybersecurity products. SAFE enables an organization to predict cyber breaches in their environment while contextually aggregating signals from existing cybersecurity products, external threat intelligence and business context. ...
  • 28
    Big Network

    Big Network

    Big Network

    ...Private networking is hard, complex and expensive. There is a multitude of legacy technologies to choose from, each driven by an ecosystem of hardware and software vendors and their objectives.
    Starting Price: $100 per month
  • 29
    Cybrary

    Cybrary

    Cybrary

    ...We build and aggregate over 1,000 secure, browser-based virtual labs, practice tests, and assessments in fields such as cybersecurity, IT, cloud technologies, data science, and more. Prepare for in-demand industry certifications with courses, virtual labs, and practice tests tied directly to the exam’s learning objectives.
    Starting Price: $19 per month
  • 30
    NdSecure

    NdSecure

    Ndende Technologies

    ...Ndsecure offers a user-friendly, flexible, and customizable identity and access management solution capable of operating within a diverse industry-centric architecture. The role played by NdSecure is to provide a robust and secure logical access control environment, incorporating strong authentication methods. The objective is to prevent unauthorized access to the corporate management system, thereby reducing frauds arising from insider threats. NdSecure’s API management platform provides more advanced ways for the workforce to control access to various applications. By leveraging existing request content and identity stores, NdSecure can provide: • Policy-based authentication • Coarse and fine-grained authorization • Single sign-on (using SAML, OpenId Connect, social log-in or OAuth-based federation) • Support for Common Criteria • Uses FIDO 2.0 and W3C WebAuthn
    Starting Price: $8/month/user
  • Previous
  • You're on page 1
  • 2
  • Next