Results for: java netbeans object-oriented forms

Suggested Categories:

Forms Automation Software
Forms automation software is a type of software used to streamline various organizational processes. It can help automate the creation and distribution of forms, as well as the collection and analysis of data from those forms. It typically includes features such as search capabilities, integration with other systems, automated notifications, and customizable templates. These tools can help organizations save time and money by reducing manual tasks associated with form processing.
Online Form Builders
Online form builders enable the creation of fillable forms through a drag-and-drop interface in order to be embedded or shared on web pages.
Java CMS Software
Java CMS software, built on Java programming language and having multiple tools and features, is used by enterprises as a content management platform.
Form Analytics Software
Form analytics tools allow website owners to track, monitor, manage and analyze visitor interactions with web forms.
JavaScript Libraries
JavaScript libraries are collections of pre-written JavaScript code that developers can use to simplify and accelerate web development tasks. They provide ready-made functions, utilities, and components for handling common challenges such as DOM manipulation, animations, event handling, data formatting, and AJAX requests. By using libraries, developers reduce the amount of repetitive coding needed and ensure greater cross-browser compatibility. Many JavaScript libraries focus on specific areas, such as UI design, data visualization, or state management, making them versatile tools in both front-end and back-end development. They play a vital role in modern web applications by boosting efficiency, improving code quality, and supporting rapid prototyping.
JavaScript Obfuscators Software
JavaScript obfuscators are tools that transform human-readable JavaScript code into a form that is difficult to understand, reverse-engineer, or tamper with. They typically replace variable names, functions, and control structures with complex or meaningless patterns while preserving the code’s original functionality. Some obfuscators also add layers of protection like string encryption, dead code insertion, and control flow flattening to further complicate analysis.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Patient Intake Software
Patient intake software streamlines the process of collecting and managing patient information before or during their visit to a healthcare facility. It automates the registration process by enabling patients to submit personal details, medical history, insurance information, and consent forms digitally. This reduces paperwork, minimizes errors, and speeds up check-in times for a smoother patient experience. The software often integrates with electronic health records (EHR) and practice management systems to ensure seamless data flow and improved accuracy. By optimizing intake workflows, it helps healthcare providers focus more on patient care and less on administrative tasks.
Waiver Software
Waiver software helps businesses and organizations create, manage, and store electronic waivers and consent forms for customers or participants. These platforms typically include tools for customizing waiver templates, capturing digital signatures, and storing waivers securely in compliance with legal and regulatory requirements. Waiver software often integrates with mobile devices and websites, allowing customers to sign forms online or on-site using tablets or smartphones. By using this software, businesses can streamline the waiver process, reduce paper handling, and improve the efficiency of collecting necessary legal documentation.
Build Automation Tools
Build automation tools are software tools that automate the process of compiling, testing, and deploying software applications. These tools help developers streamline the building of software from source code, ensuring that the process is repeatable, consistent, and efficient. Build automation typically includes compiling code, running unit tests, generating reports, packaging software, and deploying it to different environments. By automating these steps, build automation tools reduce human errors, improve efficiency, and support continuous integration and continuous delivery (CI/CD) practices.
Code Review Tools
Code review tools are software tools designed to examine and analyze source code for errors, bugs, and vulnerabilities. They provide developers with detailed feedback on their code, highlighting areas that need improvement or optimization. These tools use a variety of techniques such as static analysis, unit testing, and peer review to ensure the quality and functionality of the code. In addition to identifying coding issues, they also help improve code security by detecting potential vulnerabilities or weaknesses in the code. Code review tools are an essential part of the development process for any software project.
Load Testing Tools
Load testing tools are used to test and verify the quality and performance of an application under workload in order to get rid of problems.
Business Filing Services
Business filing services enable anyone to quickly and easily create a business. Business filing services streamline the process of business registration, obtaining business licenses, and creating business entities such as an LLC, corporation, limited company, S corp, and more. Business filing services may also offer a la carte legal services.
HIPAA Compliance Software
HIPAA compliance software is designed to help organizations in the healthcare industry meet the requirements of the Health Insurance Portability and Accountability Act (HIPAA). These platforms provide tools to ensure that sensitive patient information is protected and that healthcare providers are compliant with HIPAA's privacy and security regulations. Features typically include secure data storage, encryption, access controls, audit trails, and risk assessments, helping organizations identify potential vulnerabilities and mitigate risks. HIPAA compliance software also helps with employee training, policy management, and reporting to ensure that organizations remain compliant during audits. By using this software, healthcare providers can reduce the risk of data breaches, avoid legal penalties, and ensure patient privacy.
NoSQL Database
NoSQL database software provides the tools to store, capture and retrieve of big data through the use of non tabular databases.
Health Assessment and Screening Software
Health screening and assessment software is a valuable tool for companies of any size. It can help organizations measure employee health risk factors and overall wellness. This type of software collects data on health conditions, lifestyle habits, and body measurements to assess an individual's health status. The data collected by the software can be used to develop tailored health plans that could reduce medical costs while improving overall wellbeing. Additionally, this type of software also assists in the tracking of progress towards meeting organizational goals for a healthier workplace environment.
View more categories (16) for "java netbeans object-oriented forms"

38 Products for "java netbeans object-oriented forms" with 3 filters applied:

  • 1
    SparkView

    SparkView

    beyond SSL

    ... and servers - Access from any device with browser (e.g. Chrome, Firefox, Edge, Opera, Safari, etc.) - No installation on clients or the target systems - One central point for administration, security and authorization - HTML5 technology - Flexible, stable and scalable - Low support and management overhead - Supports common protocols such as RDP, SSH, Telnet, VNC and HTTP(S) - No Java, no Flash, no ActiveX, no plugin, no rollout
    Starting Price: $60 per year
  • 2
    Loupe

    Loupe

    Loupe

    Know when issues happen in your application with Loupe. A logging and application monitoring solution for .NET and Java, Loupe helps software teams monitor, find, and fix errors in their applications the first time. It also gives users the visibility into events and key metrics for all applications, and offers the ability to dig deeper into specific events, sessions, users, and machines. Loupe can be deployed on-premise or as a cloud hosted solution.
    Starting Price: $25.00/month
  • 3
    Siwenoid

    Siwenoid

    Siwena

    SIWENOID is a JAVA application and runs under Windows, Linux or Mac OS X. It is flexible, reliable, user, and engineer friendly. SIWENOID can integrate many types of subsystems and unify the operation of all. Supports SIEMENS, Bosch, Dahua, Texecom, Paradox systems and many more. Control everything on one (or more) screen with a unified user interface for every subsystem. Siwenoid is built on open-source foundations to keep the cost of the product lower. To keep up with the constant firmware...
  • 4
    RoboForm

    RoboForm

    Siber Systems

    RoboForm securely stores all of your passwords and logs you in with a single click (or tap). Save time entering personal and billing information with AutoFill for long web forms. RoboForm's random password generator will create a strong and unique password for each site. Say goodbye to using weak or duplicate passwords for everything. Securely share Login information with other RoboForm users. Simply enter the recipient’s email and share away. To protect your data, RoboForm uses AES-256 bit...
  • 5
    Appenate

    Appenate

    Appenate

    Reduce Paper-Based Work With Our Drag-n-Drop App Builder. Create Data-Driven Apps That Empower Your Business. Mobile & Desktop. No Coding Required. A no-code platform for creating data-driven apps to replace paper forms across all industries. Use our versatile drag-n-drop software to schedule, dispatch, track & manage jobs. “Appenate allowed our company to go paperless in the field & gave us the ability to move towards other paperless operations. Within a month we had a department of 12...
    Starting Price: $11.90/month/user
  • 6
    ManageEngine EventLog Analyzer
    ..., switches and more in real time. The solution displays analyzed data in the form of graphs and intuitive reports. EventLog Analyzer's incident detection mechanisms such as event log correlation, threat intelligence, MITRE ATT&CK framework implementation, advanced threat analytics, and more, helps spot security threats as soon as they occur. The real-time alert system alerts users about suspicious activities, so they can prioritize high-risk security threats.
    Starting Price: $595
  • 7
    Nxt

    Nxt

    Jelurida Swiss

    Nxt is an open source blockchain platform and the first to rely entirely on a proof-of-stake consensus protocol. Launched in November 2013 and written from scratch in Java, Nxt is proof that blockchain technology is not only about simple transfer of value but also has the potential to revolutionize many aspects of our lives with the various decentralized applications that can be built with it. Today, Nxt remains one of the most tested and reliable platforms in the industry, influencing numerous...
  • 8
    Quick License Manager (QLM)

    Quick License Manager (QLM)

    Soraco Technologies

    ... application with a few lines of code. Send email notifications to your customers based on selected triggers. e-Commerce integration to automate the license key generation process with the ordering process. Analytics to understand usage behavior. Self Help portal for your customers. Check for Updates for your application. Trial Registration Form to allow your customers to request a trial license.
    Leader badge
    Starting Price: $200 one-time payment
  • 9
    Routee

    Routee

    AMD Telecom

    ... to customers on important data regarding their transactions -Marketing Automation: rich forms & customer data capture, automation of repetitive marketing tasks, and tracking of marketing campaigns -Two Factor Authentication: a second layer of security with fallback through SMS, Voice, Viber & Missed Call -Cloud IVR: multilingual capabilities, turning speech into text, & text to human-sounding speech -Push Notification: personalized web & mobile push notifications, based on segmentation and user
    Starting Price: $0.01 one-time fee
  • 10
    Revenera Usage Intelligence
    ... software applications doesn’t just provide a better foundation for Product Management decisions. Technical and environment data gives insights for Development teams trying to plan for infrastructure and support requirements. Usage Intelligence, the first software usage analytics solution designed for distributed C/C++, .NET, Obj-C and native Java applications on Windows, Macintosh, and Linux, provides deep insight into application usage. See which features are used most and least.
  • 11
    4identity
    4identity is the technological solution developed by Bit4id that empowers web applications with Digital Signature and Authentication processes. 4identity does not use Java Applets or any other third party add-on. It is simple, its is compatible with any web browser and works under the most used operating systems. The “integration-less” Engine to add Digital Signature and Strong Authentication to web applications through a simple API. 4identity means usability, providing a “1-click signing” user...
  • 12
    Apache Syncope

    Apache Syncope

    Apache Software Foundation

    Apache Syncope is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license. Identity management (or IdM) means managing user data on systems and applications, using the combination of business processes and IT. Computers work with records of data about people. Such records contain technical information needed by the system for which the account is created and managed. Have you ever been hired...
  • 13
    Arachni

    Arachni

    Arachni

    ... command line scanner utility, to a global high performance grid of scanners, to a Ruby library allowing for scripted audits, to a multi-user multi-scan web collaboration platform. In addition, its simple REST API makes integration a cinch. Finally, due to its integrated browser environment, it can support highly complicated web applications which make heavy use of technologies such as JavaScript, HTML5, DOM manipulation and AJAX.
  • 14
    LoginID

    LoginID

    LoginID

    ... a transaction can be cryptographically signed providing proof of the user’s confirmation of that specific transaction, which is perfect for merchants who want payment authentication services. LoginID is aligned with PSD2, GDPR, CCPA, and HIPPA. We have SDKs for iOS, Android, React-Native, Web, Python, Java, and Node as well as a WordPress Plugin.
    Starting Price: Free
  • 15
    Maltego

    Maltego

    Maltego Technologies

    Maltego is a Java application that runs on Windows, Mac and Linux. Maltego is used by a broad range of users, ranging from security professionals to forensic investigators, investigative journalists, and researchers. Easily gather information from dispersed data sources. View up to 1 million entities on a graph​. Access over 58 data sources in the Maltego transform hub. Connect public (OSINT), commercial and own data sources. Write your own Transforms. Automatically link and combine all...
    Starting Price: €5000 per user per year
  • 16
    Everykey Vault
    Everykey is a B2B cybersecurity solution in the form of mobile app that streamlines the generation and management of secure passwords, in addition to access management, all using military-grade encryption to safeguard devices.
  • 17
    Snorkel-BX

    Snorkel-BX

    Odyssey Technologies

    Snorkel-BX is a versatile transaction security server that enables secure communication and trust between business applications. B2B applications form the backbone of e-commerce and are often the target for hackers. Securing business applications from hackers is often complicated due to requiring painful integration and constant maintenance, not to mention a dedicated team with esoteric PKI knowledge. The complexity of securing B2B applications stems from the fact that the transacting entities...
  • 18
    Greenbone Enterprise

    Greenbone Enterprise

    Greenbone Networks

    ... on your network size and frequency of scans. In virtual form, the Greenbone Enterprise Appliances are available for small to medium-sized enterprises and branch offices, as well as for special use cases such as training and audit-via-laptop.
  • 19
    Concealer

    Concealer

    BeLight Software

    This reliable encryption Mac software stores information in the form of cards and uses industry-standard methods of data encryption (AES-256) to protect your credit card numbers, website passwords, software license codes, confidential files and photos, and much more. This password manager comes with card templates that make it quick and easy to store credit card details, passwords and login information, software serial numbers. Just choose a category and copy your data into the fields. Without...
    Starting Price: $19.99 one-time payment
  • 20
    Kaspersky Password Manager
    Automatically fills out login fields. Plus auto-completes online forms with info like email addresses and bank card details. Stores your documents, medical records and photos in an encrypted vault only you can unlock. Enables you to generate super-strong and unique passwords for all your various online accounts. Lets you create passwords when you register new accounts - or replace weak passwords in existing ones. Alerts you if you’re using weak or duplicate passwords and prompts you to generate...
    Starting Price: $14.99 per user per year
  • 21
    Sticky Password

    Sticky Password

    Sticky Password

    Creates & remembers strong passwords for all your accounts and types them for you. Keeps all your logins, credentials and credit cards ready for use and absolutely secure. World's leading security — AES‑256 encryption, biometric authentication & enhanced two‑factor authentication. Wherever you go, you'll always have access to all your passwords, logins and credentials thanks to Sticky Password's secure synchronization & backup. Automatically fill in forms with names, addresses, phone numbers...
    Starting Price: $19.99 per user per month
  • 22
    Accellion

    Accellion

    Accellion

    The Accellion secure content communication platform prevents data breaches and compliance violations from third party cyber risk. CIOs and CISOs rely on the Accellion platform for complete visibility, compliance and control over the communication of IP, PII, PHI, and other sensitive content across all third-party communication channels, including email, file sharing, mobile, enterprise apps, web portals, SFTP, and automated inter-business workflows. When users click the Accellion button,...
    Starting Price: $15.00/month/user
  • 23
    Rohos Logon Key

    Rohos Logon Key

    Tesline-Service

    ... changes. Rohos uses NIST-approved data-security principles and encryption: the password is not stored on the authentication key in open form. USB key copy protection prevents the creation of key copies without authorization. All data on the key is encrypted with AES-256 bit key length.
    Starting Price: $32 one-time payment
  • 24
    cux.io

    cux.io

    cux.io

    CUX is a Digital Experience Analytics tool, helping companies save up to 5x time on analytics and drawing valuable conclusions. We eliminate data overload with a laser focus on user problems, frustrations, and all bottlenecks that can prevent them from using online channels to buy product and services. CUX is a comprehensive, user-focused analytics tool that provides instant behavioral insights. ✔ Goal-oriented Analytics: CUX automatically selects ONLY the data that is relevant to...
    Starting Price: €79 per month
  • 25
    Comodo Dome Antispam
    ... features and restrictions. Containment protects from the newest forms of ransomware, zero-malware, and other advanced threats. The Valkyrie file verdict system analyzes unknown files. Users are free to open, execute and use the attachments with ZERO risk of infection. Comodo's unique containment technology ensures that risks are fully contained before reaching the end point, so there is no risk of infection, even from the newest malware.
    Starting Price: $4.00/one-time/user
  • 26
    NordPass Business

    NordPass Business

    Nord Security

    ... - Fill in forms faster with the autofill feature - Track weak and outdated passwords among all employees - Enable multi-factor authentication Start a 30-day free trial (no card required) to boost your company’s productivity and safety.
    Leader badge
    Starting Price: $3.59 per user / per month
  • 27
    NetScaler

    NetScaler

    Cloud Software Group

    Application delivery at scale can be complex. Make it simpler with NetScaler. Firmly on-prem. All-in on cloud. Good with hybrid. Whichever you choose, NetScaler works the same across them all. NetScaler is built with a single code base using a software-based architecture, so no matter which ADC form factor you choose — hardware, virtual machine, bare metal, or container — the behavior will be the same. Whether you are delivering applications to hundreds of millions of consumers, hundreds...
  • 28
    ESET PROTECT
    ... save time and better protect against future attacks. Easily meet reporting requirements and save time with scheduled reporting and dozens of customizable templates. A user within your network might open a malicious email containing a new form of ransomware. Programmers who work with code on their work computers might tend to create false positives due to compiling software.
    Starting Price: $239 per year
  • 29
    Authentic8 Silo
    Silo delivers secure anywhere, anytime web access, managed by policy and protected by rigorous controls. By shifting the exploit surface away from potential points of risk, Silo establishes trusted access to the web. Silo shifts your risk to an isolated cloud-native environment that you control. Silo can be configured specifically to meet your most demanding requirements. The Silo Web Isolation Platform is a secure, cloud-native execution environment for all web-based activity. Silo is...
  • 30
    ActiveState

    ActiveState

    ActiveState

    ... to exploits. ActiveState’s solution provides your DevSecOps with a comprehensive view of open source vulnerability status across your application portfolio, enabling them to prioritize the vulnerabilities that matter, assess the risk of updates, and choose recommended remediation paths. The ActiveState platform centers on open source languages packaged as runtimes that can be deployed in various form factors. Low-to-no CVE container images are also available for plug-in and play needs.
  • Previous
  • You're on page 1
  • 2
  • Next