Ametys is a powerful Web CMS used by many institutions of higher education and government, but also industries and SMEs. It is known for its ergonomic design which promotes ease of use, its social Web functionality, and the ability to manage a large number of users. It makes content publishing accessible for the non-programmer and provides an easy editorial interface very similar to Microsoft Office applications.
Magnolia is a CMS which delivers smartphone simplicity on an enterprise scale. The mobile-inspired HTML5 user interface works through customisable, task-focused Apps, a notification stream called the Pulse, and a system of Favorites for quickly accessing the workspace. Magnolia allows organizations to orchestrate online services, sales, and marketing across all digital channels, maximizing the impact of every touchpoint. Magnolia’s Open Source technology, support of open standards such as CMIS and JCR, and integration with the Spring Framework enable developers to unlock backend systems and third-party applications. Magnolia is used in more than 100 countries across the world by governments and leading FORTUNE 500 enterprises.
PowerSeek SQL allows you to create, manage, and run your own search engine and directory portal with total control and ease. it is user friendly in every aspect and built for the most demanding uses and customization needs. It comes with an extensive admin panel, the ability to sell link listings, SEO friendly URLs, link reviews/ratings, content sensitive banner rotator, spam filter, broken link checker, custom data fields, mailers, crawlers, pre-designed template sets, reciprocal link checker, image/video/file uploading, RRS feeds, optional PPC functionality, and much more. It can be used for Yellow Pages, real estate, and travel directories, complex product catalogs, image galleries, and more.
integrit is an alternative to file integrity verification programs like tripwire and aide. It helps you determine whether an intruder has modified a computer system. integrit's major advantages are a small memory footprint and simplicity. It works by creating a database that is a snapshot of the most essential parts of your computer system. You put the database somewhere safe, and you can then use it to make sure that no one has made any illicit modifications to the computer system. In the case of a break in, you know exactly which files have been modified, added, or removed.