Athena Framework for Java is a full fledged enterprise object-relational mapping (ORM) framework that employs metadata as mapping configuration. It greatly simplifies Java Web application development by removing the requirement of manual mapping and manual database schema updating. In addition to features like Java object persistence, powerful EJBQL querying execution, and comprehensive code generation, Athena has built-in support for multi-tenancy, which enables developers to build cloud applications easily. Athena can be easily integrated with other libraries like Struts or Spring to provide full stacks of service.
Moterako is a Semantic Web operating system. It provides users with a tool for integrated management of knowledge. It proposes a model of representation, manipulation, and exploitation of all human knowledge. On a collective level, Moterako aims for the establishment of an open and shared knowledge base.
iLAP (Laboratory data management, Analysis, and Protocol development) is a workflow-driven information management system specifically designed to create and manage experimental protocols and to analyze and share laboratory data. The system combines experimental protocol development, wizard-based data acquisition, and high-throughput data analysis into a single, integrated system.
Sight is a Java Web framework built on top of J2EE technologies, and particularly on top of the servlet API. SightWF provides a simple programming model for building RIA applications. SightWF is initially designed to be deployed on Google App Engine, and can be run in a J2EE servlet container such as Tomcat.
With the Cibet framework, it is very easy to add various control mechanisms into a JPA and/or EJB-based Java application. The actual version includes control schemes like Archiving (manipulation of domain objects; data and execution of business processes are archived). From the archived state, domain objects can be reconstructed and business processes can be re-invoked with the same parameters at any time. The archive entries are secured against manipulation to make them audit-proof and revision safe. Four-eyes principle: this scheme is an example of a dual control mechanism: A user wants to perform some critical data manipulation or business process. With an applied dual control mechanism, the action is not executed in the production system directly, but stored and postponed. A second user must check the data and the action and can approve or decline. Only when the second user approves, the data manipulation or business process is executed in the production system; otherwise it is discarded. An even stricter example for a dual control mechanism is the six-eyes principle. In this case, a third user must approve a data manipulation or business process before it will become productive.