Results for: swing based visual query builder java code

Suggested Categories:

No-Code Development Platforms
No-code development platforms provide a way for users to design, build, and develop software applications without the need for traditional coding. They are built in such a way that users can rely on simple visual interfaces with drag and drop type tools, allowing them to rapidly develop applications with minimal technical knowledge. This makes no-code development platforms ideal for any user regardless of programming experience, from hobbyists to entrepreneurs. Furthermore, modern no-code platforms allow complex mobile apps or web projects to be created more quickly than ever before.
QR Code Generators
QR code generators are tools that allow users to create quick response (QR) codes, which are machine-readable barcodes that store information such as URLs, text, contact details, or Wi-Fi credentials. These tools typically allow users to customize QR codes by changing their size, color, and design while ensuring the code remains scannable. QR code generators are commonly used for marketing, event registration, payments, product packaging, and contactless interactions. They help businesses and individuals provide an easy way for users to access digital content or services through their smartphones or other scanning devices.
Code Collaboration Tools
Code collaboration tools are platforms that enable developers to work together on software projects by facilitating real-time collaboration, version control, and code sharing. These tools allow multiple developers to edit and review code simultaneously, track changes, and manage different versions of code through branches and commits. Key features typically include code reviews, pull requests, conflict resolution, issue tracking, and integration with version control systems like Git. Code collaboration tools are essential for team-based development environments, ensuring smooth coordination and improving productivity in software projects.
Visual Configuration Software
Visual configuration software allows users to create and customize products by visually selecting options and features, making it ideal for industries like manufacturing, retail, and custom products. These platforms provide an interactive interface where customers or users can configure products by choosing colors, sizes, materials, and other specifications, all in real time. The software typically includes 3D models or visual representations of the product to give users an accurate view of their customizations. Visual configuration software often integrates with e-commerce platforms, product management systems, and order fulfillment processes, ensuring a seamless experience from design to delivery.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Coding Challenge Platforms
Coding challenge platforms, also known as code assessment and technical skills testing platforms, enable developers and organizations to test their coding skills to see what skills need to be improved, or to determine the coding skills of a potential hire. Many coding challenge platforms also offer features like coding competitions, mock interviews, and collaboration opportunities for learning with others. These platforms are popular among job seekers, developers, and coding enthusiasts looking to enhance their problem-solving abilities.
Data Visualization Software
Data visualization software helps converting numeric and textual data into visual tools and performance dashboards in order to identify and analyze possible patterns.
Home Builder Software
Home builder software facilitates the monitoring of home-building projects, their progress, scheduling and costs, while providing customer management tools.
Website Builder Software
Website builders are tools that allow users to create websites without coding. These platforms provide a range of features and tools, such as drag-and-drop design elements, hosting, and domain registration. Website builders have become popular due to their ease-of-use and cost savings compared to hiring a professional web developer or designer. They are also typically well supported with step-by-step tutorials and customer service options for those who need help getting started.
Code Editors
Code editors are software tools that allow developers to write, edit, and debug source code for programming and web development. These editors provide essential features like syntax highlighting, code completion, auto-indentation, and error detection to enhance productivity and reduce coding errors. Many code editors also offer integrations with version control systems (like Git), debuggers, and build tools, allowing developers to manage their code and workflows efficiently. While some code editors are lightweight and focused solely on text editing, others offer extensive features and customization options through plugins and extensions. By providing a streamlined environment for coding, code editors are essential for software development, web development, and scripting tasks.
Visual Project Management Software
Visual project management software enables teams and project managers to visually plan and track progress of projects.
Infrastructure as Code Software
Infrastructure as Code (IaC) tools are software solutions that enable developers and IT teams to automate the provisioning, configuration, and management of infrastructure using code. These tools allow users to define and manage infrastructure components like servers, databases, and networking resources through configuration files, ensuring consistency and repeatability in infrastructure setups. IaC tools typically support version control, enabling teams to track changes and collaborate on infrastructure management.
Code Search Engines
Code search engines are specialized search tools that allow developers to search through codebases, repositories, or libraries to find specific functions, variables, classes, or code snippets. These tools are designed to help developers quickly locate relevant parts of code, analyze code quality, and identify reusable components. Code search engines often support various programming languages, providing search capabilities like syntax highlighting, filtering by file types or attributes, and even advanced search options using regular expressions. They are particularly useful for navigating large codebases, enhancing code reuse, and improving overall productivity in software development projects.
Online Form Builders
Online form builders enable the creation of fillable forms through a drag-and-drop interface in order to be embedded or shared on web pages.
Code Enforcement Software
Code enforcement software is software that helps local government agencies and municipalities manage and enforce building codes, zoning laws, and other regulatory compliance requirements. These platforms typically provide features for tracking violations, issuing citations, managing inspections, and automating the code enforcement process. Code enforcement software can also include tools for scheduling inspections, documenting findings, generating reports, and managing case histories. It helps ensure that properties comply with local laws and ordinances, improving efficiency and accountability in enforcement processes. Additionally, it allows for better communication between enforcement officers, residents, and other stakeholders.
Revenue-Based Financing Companies
Revenue-based financing companies, also known as royalty-based financing companies, are companies that provide financing to businesses with predictable revenue streams. Revenue-based financing firms provide upfront capital in exchange for a percentage of top line revenue, or a fixed percentage of each contract. Revenue-based financing solutions are ideal for companies with predictable, recurring revenue such as SaaS companies, ecommerce retailers, subscription businesses, and more.
Account-Based Advertising Software
Account based advertising software is used by businesses and marketers to improve customer engagement through the use of targeted and personalized digital ads.
Usage-Based Billing Software
Usage-based billing software, also known as metered billing software, enables companies to charge their clients and customers based on their usage, rather than one-time fees or flat subscription rates. Usage-based billing systems provide companies with the ability to offer pricing models based on metered billing, and also offer usage and consumption statistics.
Account Based Marketing Software
Account based marketing software is a technology solution that enables businesses to target and engage specific accounts or customer segments. This software typically provides features such as segmentation, personalized content, account profiles and customer intelligence. It helps marketers identify the right audiences and deliver relevant messages to boost brand awareness and increase sales.
AI Coding Assistants
AI coding assistants are software tools that use artificial intelligence to help developers write, debug, and optimize code more efficiently. These assistants typically offer features like code auto-completion, error detection, suggestion of best practices, and code refactoring. AI coding assistants often integrate with integrated development environments (IDEs) and code editors to provide real-time feedback and recommendations based on the context of the code being written. By leveraging machine learning and natural language processing, these tools can help developers increase productivity, reduce errors, and learn new programming techniques.
View more categories (20) for "swing based visual query builder java code"

107 Products for "swing based visual query builder java code" with 4 filters applied:

  • 1
    Code Intelligence

    Code Intelligence

    Code Intelligence

    Our platform uses various security techniques, including coverage-guided and feedback-based fuzz testing, to automatically generate millions of test cases that trigger hard-to-find bugs deep within your application. This white-box approach protects against edge cases and speeds up development. Advanced fuzzing engines generate inputs that maximize code coverage. Powerful bug detectors check for errors during code execution. Uncover true vulnerabilities only. Get the input and stack trace...
  • 2
    Query Inside

    Query Inside

    Queryinside

    queryinside – All-in-One AI-Powered Analytics Platform Overview: queryinside is a powerful AI-powered business analytics platform that helps you monitor, track, and analyze user behavior across your websites, web apps, or internal datasets. It’s designed to make data easy to search, understand, and act on—without needing technical skills or writing complex queries. With queryinside, you get real-time insights into user activity, search trends, page views, clicks, and custom events...
    Starting Price: $10
  • 3
    groundcover

    groundcover

    groundcover

    Cloud-based observability solution that helps businesses track and manage workload and performance on a unified dashboard. Monitor everything you run in your cloud without compromising on cost, granularity, or scale. groundcover is a full stack cloud-native APM platform designed to make observability effortless so that you can focus on building world-class products. By leveraging our proprietary sensor, groundcover unlocks unprecedented granularity on all your applications, eliminating...
    Starting Price: $20/month/node
    View Software
    Visit Website
  • 4
    SparkView

    SparkView

    beyond SSL

    ... and servers - Access from any device with browser (e.g. Chrome, Firefox, Edge, Opera, Safari, etc.) - No installation on clients or the target systems - One central point for administration, security and authorization - HTML5 technology - Flexible, stable and scalable - Low support and management overhead - Supports common protocols such as RDP, SSH, Telnet, VNC and HTTP(S) - No Java, no Flash, no ActiveX, no plugin, no rollout
    Starting Price: $60 per year
  • 5
    Kiuwan Code Security
    Security Solutions For Your DevOps Process. Automatically scan your code to identify and remediate vulnerabilities. Compliant with the most stringent security standards, such as OWASP and CWE, Kiuwan Code Security covers all important languages and integrates with leading DevOps tools. Effective static application security testing and source code analysis, with affordable solutions for teams of all sizes. Kiuwan includes a variety of essential functionality in a single platform that can...
  • 6
    ManageEngine OpManager
    ...-time notifications and detailed logs for quick issue detection and resolution. Achieve network automation, with workflows enabling automated diagnostics and troubleshooting actions. Advanced network visualization-including business views, topology maps, heat maps, and customizable dashboards give admins an at-a-glance view of network status. 250+ pre-built reports covering metrics like device performance, network usage, uptime, facilitate capacity planning and improved decision-making.
    Leader badge
    Starting Price: $95.00/one-time
    Partner badge
  • 7
    NetBrain

    NetBrain

    NetBrain Technologies

    NetBrain helps IT teams halve MTTR and prevent outages with AI-driven automation. Trusted by 2,500+ enterprises worldwide, our no-code, intent-based platform turns manual network operations into intelligent automation, keeping networks running smoothly and efficiently.​ Top use cases: - Automated Troubleshooting - Automated Change Management - Network AIOps - Network Assessment - Network Visibility - Network Observability - Network Security
  • 8
    Aikido Security

    Aikido Security

    Aikido Security

    Secure your code, cloud, and runtime in one central system. Aikido’s all-in-one security platform is loved by developers and security teams alike with full security visibility, insight in what matters most, and fast/automatic vulnerability fixes. Teams get security done with Aikido thanks to: - False-positive reduction - AI Autotriage & AI Autofix - Deep integration into the dev workflow (from IDEs and task managers to CI/CD gating) - Automated Compliance Aikido’s covers the entire...
    Starting Price: Free
  • 9
    TrustBuilder

    TrustBuilder

    TrustBuilder

    ... airtight, phishing-resistant security, passwordless experience, and seamless integration. > TrustBuilder's tailor made CIAM provides PBAC delivering fine grained authorization based on attributes with customisable workflows.
    Starting Price: € 10 per user / per year
  • 10
    CodeMeter

    CodeMeter

    Wibu-Systems

    CodeMeter is the award-winning protection, licensing, and security system that gives software publishers and ISVs as well as intelligent device makers a complete arsenal to protect IP and fight cyber-threats while harnessing the power of smart licensing to monetize and grow their business. CodeMeter includes a complete lineup of license containers - hardware-, software-, or cloud-based - to store secret license keys safely, a set of stealthy encryption modules, and a versatile array of backend...
  • 11
    ZITADEL

    ZITADEL

    ZITADEL

    ... login interfaces. The platform supports role-based access control, allowing for precise permission assignments based on user roles, and is inherently multi-tenant, facilitating easy extension of applications to new organizations. ZITADEL's extensibility enables seamless adaptation to various workflows, user management processes, and brand guidelines, with features like ZITADEL Actions that execute workflows after predefined events without the need for additional code deployment.
    Starting Price: $100 per month
  • 12
    ProHoster

    ProHoster

    ProHoster

    ... builder, SSL certificate, and domain. For projects, where regular hosting is not enough, and you need a larger amount of resources and functionality. Virtualization such as KVM and OVZ is available. An excellent solution for non-standard projects with increased requirements for power and full root access. Professional DDoS protection against any type of attack. Immediate response and display of the threats. Huge channel handling capacity.
    Leader badge
    Starting Price: $2.50 per month
  • 13
    tenfold

    tenfold

    tenfold

    tenfold is a no-code solution for Identity Governance & Administration (IGA), ensuring that the right people have access to the right resources at the right time. Thanks to its off-the-shelf plugins and streamlined setup, tenfold is fully operational in weeks - helping you avoid long & costly setup phases. Go from access risks to full control over IT privileges with tenfold's comprehensive IGA toolset: - User Lifecycle Management - Role-based Access - End User Self-Service - Approval...
    Starting Price: $.09/managed identity/month
  • 14
    Secfense

    Secfense

    Secfense

    ... in between your users and the applications they access. It learns the traffic patterns related to authentication. It can then enforce multi-factor authentication login and other sensitive actions without interfering with the applications existing code or database. Up-to-date 2FA methods are always available on the platform. Application changes don’t affect Secfense and applied methods. Take control over session expiration rules across all apps. Don’t rely on VPNs, base trust on users and their devices.
  • 15
    Files.com

    Files.com

    Files.com

    6,000+ companies trust Files.com to automate and secure business critical transfers. We obsess about security, compliance, reliability, and performance so your critical business processes just work every time. Easily manage any transfer flow without writing scripts or code, and onboard workloads and partners effortlessly. We support standard file transfer protocols (FTP, SFTP, AS2) for working with external partners and also provide native apps for high performance internal transfers...
  • 16
    ManageEngine Applications Manager
    ManageEngine Applications Manager is an enterprise-ready platform designed to monitor an entire application ecosystem of a business organization. Our platform helps IT and DevOps teams get visibility into all the dependent components within their application stack. With Applications Manager, it becomes easier to monitor the performance of mission-critical web applications, web servers, databases, cloud services, middleware, ERP systems, messaging components, and more. It has tons of...
    Leader badge
    Starting Price: $395.00/Year
  • 17
    Appvance

    Appvance

    Appvance.ai

    Appvance IQ (AIQ) delivers transformational productivity gains and lower costs in both test creation and execution. For test creation, it offers both AI-driven (fully machine-generated tests) and also 3rd-generation, codeless scripting. It then executes those scripts through data-driven functional, performance, app-pen and API testing — for both web and mobile apps. AIQ’s self-healing technology gives you complete code coverage with just 10% the effort of traditional testing systems. Most...
  • 18
    Global Ledger

    Global Ledger

    Global Ledger

    The Global Ledger is a blockchain analytics company and crypto AML compliance toolset that allows government agencies, banks, fintech companies, and crypto startups to access AML risk assessment, surveillance, and investigations for blockchain-based assets. Global Ledger collaborates with organizations such as the UN Office on Drugs and Crime, The Global Coalition to Fight Financial Crime, and Ukrainian, Estonian, and Swedish government agencies to track blockchain transactions and combat...
  • 19
    Scribe Security Trust Hub
    ...: streamline security guardrails to verify secure SDLC policy, based on trusted evidence. *Simplify secure SDLC processes, balancing responsibilities between dev and security teams. *Detect code tampering and software factory exploitations. *Enforce and demonstrate compliance with regulations and best practices. *Share SBOMs and security insights in a controlled manner with stakeholders.
    Starting Price: Free
  • 20
    HERE Enterprise Browser

    HERE Enterprise Browser

    Here Enterprise Inc.

    Built through collaboration with global banks, HERE Enterprise Browser provides enterprise security, workforce productivity and seamless integration of enterprise AI. HERE’s Chromium-based, zero-trust security model includes integration with Microsoft Entra and other IDPs, app access controls, data loss prevention controls, executable protection and auditability for compliance. HERE supercharges productivity through app interoperability and Supertabs that combine multiple tabs into persona...
  • 21
    Psono

    Psono

    esaqa GmbH

    Psono is a self-hosted, open-source password manager designed to safeguard your data. It encrypts and stores your credentials, ensuring only you have access. You can also securely share encrypted access with your team. With a rich set of features, Psono makes data management and password retrieval simpler than ever. Its robust security includes client-side encryption for genuine end-to-end password sharing, supplemented by SSL and storage encryption. The entire code is open for transparent...
    Starting Price: Free
  • 22
    Fleet

    Fleet

    Fleet Device Management

    Ask questions about your servers, and laptops. Whatever their operating system, wherever they live. Track and segment your enrolled hosts. Search by important details, and zoom in on individual targets. Collect and share useful information for ops teams, security teams, help desk, and more. Fleet is self-hosted and self-managed, and can be run within your own data centers or in the cloud. Write scripts with fleetctl and design scheduled queries to integrate alerts and dashboards across your...
    Starting Price: $4 per host per month
  • 23
    Acunetix

    Acunetix

    Invicti Security

    As the market leader in automated web application security testing, Acunetix by Invicti is the go-to security tool for Fortune 500 companies. DevSecOps teams can cut through the noise to uncover unseen risks and mitigate dangerous exploits, detecting and reporting on a wide array of vulnerabilities. With an industry-leading crawler that fully supports HTML5, JavaScript, and Single-page applications, Acunetix enables the auditing of complex, authenticated applications for deeper insight...
  • 24
    Maltego

    Maltego

    Maltego Technologies

    Maltego is a Java application that runs on Windows, Mac and Linux. Maltego is used by a broad range of users, ranging from security professionals to forensic investigators, investigative journalists, and researchers. Easily gather information from dispersed data sources. View up to 1 million entities on a graph​. Access over 58 data sources in the Maltego transform hub. Connect public (OSINT), commercial and own data sources. Write your own Transforms. Automatically link and combine all...
    Starting Price: €5000 per user per year
  • 25
    GoAnywhere MFT
    GoAnywhere MFT provides secure managed file transfer for enterprises. Deployable on-premise, in the cloud, or in hybrid environments, GoAnywhere MFT software enables organizations to exchange data among employees, customers, and trading partners, as well as between systems, securely. GoAnywhere MFT was a recipient of the Cybersecurity Excellence Award for Secure File Transfer.
  • 26
    DerScanner

    DerScanner

    DerSecur

    DerScanner is a convenient and easy-to-use officially CWE-Compatible solution that combines the capabilities of static (SAST), dynamic (DAST) and software composition analysis (SCA) in a single interface. It helps provide more thorough control over the security of applications and information systems and check both your own and open source code using one solution. Correlate the results of SAST and DAST, verify the detected vulnerabilities and eliminate them as a first priority...
    Starting Price: $500 USD
  • 27
    Thinfinity Workspace

    Thinfinity Workspace

    Cybele Software, Inc.

    ... Workspace 7 ensures secure reverse connections over SSL with TLS 1.3 encryption. This robust approach doesn't require client-side installations, firewall modifications, or the opening of inbound ports on your network, thereby enhancing the security infrastructure of your business. The platform ensures all browser-based connections are secured over HTTPS, offering a wide variety of authentication options, from straightforward User/Password to sophisticated Active Directory authentication.
  • 28
    VictoriaLogs

    VictoriaLogs

    VictoriaMetrics

    VictoriaLogs, an open-source log database from VictoriaMetrics, is designed to be user-friendly. It seamlessly integrates with widely used log collectors and offers a more straightforward setup process than Elasticsearch and Grafana Loki. The robust LogsQL query language provides full-text search capabilities across all log fields, simplifying log management. It scales impressively with CPU, RAM, disk IO, and space, running efficiently on Raspberry Pi and high-end servers. It handles data...
    Starting Price: $0
  • 29
    GitGuardian

    GitGuardian

    GitGuardian

    GitGuardian is an end-to-end NHI security platform that empowers software-driven organizations to enhance their Non-Human Identity (NHI) security and comply with industry standards. With attackers increasingly targeting NHIs, such as service accounts and applications, GitGuardian integrates Secrets Security and NHI Governance. This dual approach enables the detection of compromised secrets across your dev environments while also managing non human identities and their secrets...
    Leader badge
    Starting Price: $0
  • 30
    Backslash Security
    Ensure the security of your code and open sources. Identify externally reachable data flows and vulnerabilities for effective risk mitigation. By identifying genuine attack paths to reachable code, we enable you to fix only the code and open-source software that is truly in use and reachable. Avoid unnecessary overloading of development teams with irrelevant vulnerabilities. Prioritize risk mitigation efforts more effectively, ensuring a focused and efficient security approach. Reduce the noise...
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next