Results for: swing based visual query builder java code - Page 4

Suggested Categories:

No-Code Development Platforms
No-code development platforms provide a way for users to design, build, and develop software applications without the need for traditional coding. They are built in such a way that users can rely on simple visual interfaces with drag and drop type tools, allowing them to rapidly develop applications with minimal technical knowledge. This makes no-code development platforms ideal for any user regardless of programming experience, from hobbyists to entrepreneurs. Furthermore, modern no-code platforms allow complex mobile apps or web projects to be created more quickly than ever before.
QR Code Generators
QR code generators are tools that allow users to create quick response (QR) codes, which are machine-readable barcodes that store information such as URLs, text, contact details, or Wi-Fi credentials. These tools typically allow users to customize QR codes by changing their size, color, and design while ensuring the code remains scannable. QR code generators are commonly used for marketing, event registration, payments, product packaging, and contactless interactions. They help businesses and individuals provide an easy way for users to access digital content or services through their smartphones or other scanning devices.
Code Collaboration Tools
Code collaboration tools are platforms that enable developers to work together on software projects by facilitating real-time collaboration, version control, and code sharing. These tools allow multiple developers to edit and review code simultaneously, track changes, and manage different versions of code through branches and commits. Key features typically include code reviews, pull requests, conflict resolution, issue tracking, and integration with version control systems like Git. Code collaboration tools are essential for team-based development environments, ensuring smooth coordination and improving productivity in software projects.
Visual Configuration Software
Visual configuration software allows users to create and customize products by visually selecting options and features, making it ideal for industries like manufacturing, retail, and custom products. These platforms provide an interactive interface where customers or users can configure products by choosing colors, sizes, materials, and other specifications, all in real time. The software typically includes 3D models or visual representations of the product to give users an accurate view of their customizations. Visual configuration software often integrates with e-commerce platforms, product management systems, and order fulfillment processes, ensuring a seamless experience from design to delivery.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Coding Challenge Platforms
Coding challenge platforms, also known as code assessment and technical skills testing platforms, enable developers and organizations to test their coding skills to see what skills need to be improved, or to determine the coding skills of a potential hire. Many coding challenge platforms also offer features like coding competitions, mock interviews, and collaboration opportunities for learning with others. These platforms are popular among job seekers, developers, and coding enthusiasts looking to enhance their problem-solving abilities.
Data Visualization Software
Data visualization software helps converting numeric and textual data into visual tools and performance dashboards in order to identify and analyze possible patterns.
Home Builder Software
Home builder software facilitates the monitoring of home-building projects, their progress, scheduling and costs, while providing customer management tools.
Website Builder Software
Website builders are tools that allow users to create websites without coding. These platforms provide a range of features and tools, such as drag-and-drop design elements, hosting, and domain registration. Website builders have become popular due to their ease-of-use and cost savings compared to hiring a professional web developer or designer. They are also typically well supported with step-by-step tutorials and customer service options for those who need help getting started.
Code Editors
Code editors are software tools that allow developers to write, edit, and debug source code for programming and web development. These editors provide essential features like syntax highlighting, code completion, auto-indentation, and error detection to enhance productivity and reduce coding errors. Many code editors also offer integrations with version control systems (like Git), debuggers, and build tools, allowing developers to manage their code and workflows efficiently. While some code editors are lightweight and focused solely on text editing, others offer extensive features and customization options through plugins and extensions. By providing a streamlined environment for coding, code editors are essential for software development, web development, and scripting tasks.
Visual Project Management Software
Visual project management software enables teams and project managers to visually plan and track progress of projects.
Infrastructure as Code Software
Infrastructure as Code (IaC) tools are software solutions that enable developers and IT teams to automate the provisioning, configuration, and management of infrastructure using code. These tools allow users to define and manage infrastructure components like servers, databases, and networking resources through configuration files, ensuring consistency and repeatability in infrastructure setups. IaC tools typically support version control, enabling teams to track changes and collaborate on infrastructure management.
Code Search Engines
Code search engines are specialized search tools that allow developers to search through codebases, repositories, or libraries to find specific functions, variables, classes, or code snippets. These tools are designed to help developers quickly locate relevant parts of code, analyze code quality, and identify reusable components. Code search engines often support various programming languages, providing search capabilities like syntax highlighting, filtering by file types or attributes, and even advanced search options using regular expressions. They are particularly useful for navigating large codebases, enhancing code reuse, and improving overall productivity in software development projects.
Online Form Builders
Online form builders enable the creation of fillable forms through a drag-and-drop interface in order to be embedded or shared on web pages.
Code Enforcement Software
Code enforcement software is software that helps local government agencies and municipalities manage and enforce building codes, zoning laws, and other regulatory compliance requirements. These platforms typically provide features for tracking violations, issuing citations, managing inspections, and automating the code enforcement process. Code enforcement software can also include tools for scheduling inspections, documenting findings, generating reports, and managing case histories. It helps ensure that properties comply with local laws and ordinances, improving efficiency and accountability in enforcement processes. Additionally, it allows for better communication between enforcement officers, residents, and other stakeholders.
Revenue-Based Financing Companies
Revenue-based financing companies, also known as royalty-based financing companies, are companies that provide financing to businesses with predictable revenue streams. Revenue-based financing firms provide upfront capital in exchange for a percentage of top line revenue, or a fixed percentage of each contract. Revenue-based financing solutions are ideal for companies with predictable, recurring revenue such as SaaS companies, ecommerce retailers, subscription businesses, and more.
Account-Based Advertising Software
Account based advertising software is used by businesses and marketers to improve customer engagement through the use of targeted and personalized digital ads.
Usage-Based Billing Software
Usage-based billing software, also known as metered billing software, enables companies to charge their clients and customers based on their usage, rather than one-time fees or flat subscription rates. Usage-based billing systems provide companies with the ability to offer pricing models based on metered billing, and also offer usage and consumption statistics.
Account Based Marketing Software
Account based marketing software is a technology solution that enables businesses to target and engage specific accounts or customer segments. This software typically provides features such as segmentation, personalized content, account profiles and customer intelligence. It helps marketers identify the right audiences and deliver relevant messages to boost brand awareness and increase sales.
AI Coding Assistants
AI coding assistants are software tools that use artificial intelligence to help developers write, debug, and optimize code more efficiently. These assistants typically offer features like code auto-completion, error detection, suggestion of best practices, and code refactoring. AI coding assistants often integrate with integrated development environments (IDEs) and code editors to provide real-time feedback and recommendations based on the context of the code being written. By leveraging machine learning and natural language processing, these tools can help developers increase productivity, reduce errors, and learn new programming techniques.
View more categories (20) for "swing based visual query builder java code"

127 Products for "swing based visual query builder java code" with 3 filters applied:

  • 1
    SV3

    SV3

    Building Intelligence

    SV3 is a cloud-based, SAFETY-Act-certified software solution that enables secure access for visitors, vehicles and vendors. Whether it be at the lobby or loading dock of a building, warehouse or multi-tenanted environment, SV3's trusted access program ensures safe operations without gaps in your security system.
  • 2
    EmpowerID

    EmpowerID

    EmpowerID

    ... administration, password management, privileged access management, access management for SharePoint, and an identity platform for application developers. All solutions leverage a single sophisticated role and attribute-based authorization engine that handles complex organizations and even multi-tenant SaaS providers. We provide a highly scalable, fully customizable IAM infrastructure that delivers results in a more time and cost-efficient manner for your enterprise.
    Starting Price: $2 per user per month
  • 3
    CapLinked

    CapLinked

    CapLinked

    .... Magazine named CapLinked to its list of 5 Back-Office Tech Innovations. Founded in 2010 by Eric M. Jackson (PayPal’s first head of US marketing) and Christopher Grey (former private equity and investment banking executive), CapLinked is based in Los Angeles.
    Starting Price: $299/month
  • 4
    BelManage
    BelManage allows users to reduce their software license and maintenance costs, monitor their cybersecurity status and configuration details. BelManage is based on Belarc’s Cloud architecture, uses a single Intranet server and database, and automatically creates an accurate and up-to-date central repository (CMDB) of software, hardware and security configuration details. Belarc’s cloud architecture allows users to simplify and automate the monitoring of all of their desktops, laptops, servers...
    Starting Price: $10 per computer
  • 5
    Axonius

    Axonius

    Axonius

    Axonius gives customers the confidence to control complexity by providing a system of record for all digital infrastructure. With a comprehensive understanding of all assets including devices, identities, software, SaaS applications, vulnerabilities, security controls, and the context between all assets, customers are able to mitigate threats, navigate risk, decrease incident response time, automate action, and inform business-level strategy — all while eliminating manual, repetitive tasks....
  • 6
    Xink

    Xink

    Xink

    ... drive traffic and interest. With role-based login, the marketing or communications department can easily manage it. After the initial setup (45 min), IT has no workload. Safely hosted at ISO 27001-certified data centers (Microsoft Azure). This ensures the best, most secure data storage available – under all laws and regulations, including GDPR.
    Starting Price: $1/user/month
  • 7
    Armis

    Armis

    Armis Security

    Armis, the leading asset visibility and security company, provides the industry’s first unified asset intelligence platform designed to address the new extended attack surface that connected assets create. Fortune 100 companies trust our real-time and continuous protection to see with full context all managed, unmanaged assets across IT, cloud, IoT devices, medical devices (IoMT), operational technology (OT), industrial control systems (ICS), and 5G. Armis provides passive cyber asset...
  • 8
    Transmit Security

    Transmit Security

    Transmit Security

    ... and risk policy decisions into simple journeys. Enjoy flexible policy orchestration engine for all applications and channels. Protect your workplace and workforce whether in the office or remote. No matter what location or device enjoy the benefits of risk based technology that provides impenetrable security. Go passwordless and keep your enterprise secure.
  • 9
    OpenOTP Security Suite
    OpenOTP Security Suite is a European Enterprise-grade Security all-in-one Solution for Identity & Access Management (IAM), including : - Multi-Factor Authentication (MFA/2FA) with U2F / OTP, applicable even for Legacy Applications - Federation Services (SSO with OpenID & SAML / ADFS) - Network Access Control (protecting Wifi & Ethernet Swiches) - VPN security (via an included Radius Bridge), designed specifically for remote work - Windows logins & Remote Desktop Services...
    Starting Price: €1.85/User/M
  • 10
    Password Depot

    Password Depot

    AceBIT GmbH

    Password Depot securely protects your passwords and documents from unauthorized access. Whether you work from home or at a large corporation access your passwords on your Windows, Android, iOS or macOS device. From now on, you will only need to remember one single password - for Password Depot. State-of-the-art security measures are in place to secure your sensitive data against external access by double encryption based on the highest security standard AES (Rijndael 256). All whilst remaining...
  • 11
    Applivery

    Applivery

    Applivery

    Applivery is a modern, cloud-based Unified Endpoint Management UEM / MDM platform that provides comprehensive control over Android, Apple, and Windows devices. It offers seamless integration with identity providers, enabling single sign-on (SSO) for enhanced security. The platform supports zero-touch deployment, allowing for efficient device provisioning without manual intervention. Applivery’s advanced analytics deliver insights into device performance and user experience, facilitating...
    Starting Price: €2/device
  • 12
    TozID

    TozID

    Tozny

    An SSO and Customer Identity Management platform with privacy and end-to-end encryption built in. Centralize Access Control without centralizing your security risk. Our cryptography-at-the-edge approach delivers identity protection where you need it – secure your customer’s accounts with strong encryption and a customizable UI, or streamline protected access for your business and employees with SSO. All the features you expect – including SAML & OIDC support along with push-based MFA and more...
  • 13
    GateKeeper Password Manager

    GateKeeper Password Manager

    Untethered Labs, Inc.

    Proximity-based passwordless login to PCs, Macs, websites, and desktop applications. Hands-free, wireless 2FA and password manager through active proximity-detection. IT admins can dynamically allow users to log in to their computers and websites with a physical key either automatically, by touch, by pressing Enter, or with a PIN. Seamlessly login, switch users, switch computers, and logout without passwords, touch, or trouble - just a key. Once a user walks away, the computer will lock...
    Starting Price: $3/user/month
  • 14
    Azure Front Door
    Scalable and secure entry point for fast delivery of your global applications. Easily join your distributed microservice architectures into a single global application using HTTP load balancing and path-based routing rules. Automate turning up new regions and scale-out with API-driven global actions, and independent fault-tolerance to your back end microservices in Azure—or anywhere. Deliver and protect your global application close to your end users with a "battle-tested" service built...
  • 15
    BlueFletch

    BlueFletch

    BlueFletch

    Advanced enterprise-grade security tools for employee Android devices. BlueFletch's Enterprise Mobile Security (EMS) software helps organizations secure, support, and manage their enterprise mobile Android devices. Our Atlanta-based team of software engineers, project managers, UX designers, business analysts, and QA helps clients move fast and solve business problems through the use of mobile technology. We’ve learned a thing or two over the past 10+ years in enterprise mobility, successfully...
    Starting Price: $17 per device
  • 16
    IdentityForce

    IdentityForce

    IdentityForce

    IdentityForce, a Sontiq brand, offers proven identity, privacy, and credit security solutions. We combine advanced detection technology, real-time alerts, 24/7 U.S.-based support, and identity recovery with over 40 years of experience to get the job done. Backed by our million dollar insurance policy, it’s why we’ve been trusted by millions of people, Global 1000 organizations, and the U.S. Government. Identity theft means someone is using your information to make purchases, open new accounts...
    Starting Price: $17.95 per month
  • 17
    Sertainty

    Sertainty

    Sertainty Corporation

    Sertainty Corporation is a Nashville based technology company offering software architects, developers and IT administrators an easy way to embed intelligence into data-files empowering data with an ability to act and react to protect itself. Our goal is to prevent theft of intellectual property, proprietary and confidential information. Data is passive and inert. Data loss and theft is a symptom of the problem. The solution to the problem is to give data the ability to control its own fate...
  • 18
    1Kosmos

    1Kosmos

    1Kosmos

    1Kosmos enables passwordless access for workers, customers and citizens to securely transact with digital services. By unifying identity proofing and strong authentication, the BlockID platform creates a distributed digital identity that prevents identity impersonation, account takeover and fraud while delivering frictionless user experiences. BlockID is the only NIST, FIDO2, and iBeta biometrics certified platform that performs millions of authentications daily for some of the largest...
  • 19
    PXL Vision

    PXL Vision

    PXL Vision

    PXL Vision revolutionizes digital identity verification, automating customer onboarding and KYC processes to increase conversion rates. As the Swiss market leader for digital identity verification, our flexible solutions utilize efficient, AI-based ID checks as a SaaS or on-premise solutions. With our patented technologies, we ensure fast, reliable, and user-friendly identification processes that seamlessly integrate into existing workflows. Our Auto-ID adapts to various customer needs...
  • 20
    Traced Trustd MTD
    Traced Trustd MTD for businesses delivers groundbreaking MTD (mobile threat defense) that gives you immediate visibility and analysis of mobile threats. Every personal and business-owned mobile device is a gateway to business data and a route to your network. The Traced app protects your mobile devices and Traced Trustd MTD gives your IT and security teams the tools they need to protect your business. Traced protects employee devices from application, network and device-based threats including...
    Starting Price: £9/device/year
  • 21
    VirusTotal

    VirusTotal

    VirusTotal

    ... available submission methods. Submissions may be scripted in any programming language using the HTTP-based public API. VirusTotal can be useful in detecting malicious content and also in identifying false positives, normal and harmless items detected as malicious by one or more scanners. As with files, URLs can be submitted via several different means including the VirusTotal webpage, browser extensions and the API.
  • 22
    ANY.RUN

    ANY.RUN

    ANY.RUN

    ANY.RUN is an online interactive sandbox for DFIR/SOC investigations. The service gives access to fast malware analysis and detection of cybersecurity threats. The effectiveness of the solution has been proven by over 500,000 active users who find new threats with ANY.RUN daily. ANY.RUN provides an interactive sandbox for malware analysis, offering deep visibility into threat behavior in a secure, cloud-based environment with Windows, Linux, and Android support. It helps SOC teams...
  • 23
    KernelCare Enterprise
    Global organizations trust TuxCare for live patching their critical Linux hosts and OT devices across their hybrid multi-cloud environments. No reboot is required to deploy and enable the TuxCare KernelCare Enterprise solutions to live patch Linux kernels and critical system libraries, including OpenSSL and Glibc. In contrast, all hosts and devices maintain the current production level uptime while receiving all security updates. TuxCare automates the patching process and eliminates the...
    Starting Price: $3.95 per month
  • 24
    Panaseer

    Panaseer

    Panaseer

    Panaseer’s continuous controls monitoring platform sits above the tools and controls within your organisation. It provides automated, trusted insight into the security and risk posture of the organisation. We create an inventory of all entities across your organisation (devices, apps, people, accounts, databases). The inventory highlights assets missing from different sources and where security controls are missing from assets. The platform equips you with metrics and measures to understand...
  • 25
    WithSecure Elements XDR
    WithSecure Elements Cloud seamlessly integrates software, services, and all essential security capabilities into a single unified solution. WithSecure's modular Elements Cloud cyber security platform seamlessly integrates Extended Detection and Response (XDR), Exposure Management (XM) and Co-Security Services into a single unified solution. WithSecure Elements XDR includes Elements Endpoint Security (EPP+EDR), Identity Security for Microsoft Entra ID, Collaboration Protection for...
  • 26
    RecFaces

    RecFaces

    RecFaces FZ-LLC

    ... a mobile application; - Improving the accuracy of identifications during operation due to self-learning of the system and auto-update of the profile base; - Efficiency of incident investigation using parametric search in a long-term archive; - Fast search for people in the archive by photo, video or verbal description of facial features, hair, glasses, etc.; - Simple construction of complex reports, including the routes of people moving on the facility’s maps in the system.
  • 27
    ijura

    ijura

    ijura

    Ijura Enterprise is a cloud-deployed next-generation mobile threat defense solution that protects end-user devices and IoT in the data network. Our cloud-based solution protects smartphones, laptops (with SIM), tablets, and IoT devices from malicious content and cybercriminal threats. With three patents already filed, our innovation addresses mobile security in a holistic fashion. This means we solve the vulnerabilities where sophisticated attacks bypass security layers while ensuring the end...
  • 28
    Securden Unified PAM
    Discover and consolidate all privileged account credentials into a centralized repository. Regulate access to all critical IT assets. Grant just-in-time access, and enforce least privilege on devices in the organization. • Enforce remote password resets on devices. • Manage Windows domain, service, local admin accounts & their dependencies. • Eliminate hardcoded-credentials from scripts and configuration files. • Automate password access for non-human identities with APIs. •...
  • 29
    OXARI

    OXARI

    Infonet Projekt SA

    ... interface, allows you to model any Asset Management, CMDB, ServiceDesk, Workflow, and MDM work logic. - The system can be accessed using any web browser. It also allows you to design all the user interface components by yourself. MULTIPLE CONFIGURATIONS Rule-based management is the main component of the system that ensures configuration flexibility. OXARI allows you to create any number of patterns consisting of specific rules and actions.
    Starting Price: $7/month/user
  • 30
    NCheck BioAttendance

    NCheck BioAttendance

    Neurotechnology

    NCheck BioAttendance is a Multi-Biometric Attendance Management System designed to register and manage employee attendance using face, fingerprint, and iris biometric identification. Powerful features: Face, Fingerprint, and Iris attendance recognition Geofencing and locaton based tracking Contactless and hygienic Identification with face mask Face liveness detection Real-time face detection Multiple face detection Detect stress level
    Starting Price: $0 for 5 user