Cerb is a fast and flexible Web-based platform for business collaboration and automation. It helps you remember anything about anyone, collaborate from anywhere, deftly reply to a flood of email, automate, stay informed, capture feedback, track time, flag opportunities, manage tasks, share expert knowledge, and otherwise execute efficiently.
beaTunes is an iTunes companion app capable of automatically analyzing your music collection to help you build better playlists. It analyzes BPM (beats per minute), silence at the beginning or end of a song, and the color (based on frequency spectrum) of a given song. Some of the data is stored through iTunes, and some is stored by beaTunes itself. beaTunes can suggest albums that would complement your music collection, display music charts, and help you find and fix errors in your song meta data, like typos and wrong genres. It also allows you to blog about selected songs or playlists.
Arkeia Network Backup is designed for organizations that require fast, easy-to-use, and affordable data protection. It backs up critical data to disk, tape, and cloud storage. Arkeia protects all major virtual platforms including VMware, Hyper-V, XenServer, and more than 200 physical platforms including Windows, Mac OS X, Linux, Netware, most UNIX flavors, and BSDs. The company’s source-side Progressive Deduplication technology helps users realize better performance at a lower cost by reducing data volumes. Arkeia’s deduplication is crucial to accelerating replication of on-premise backups to private or public clouds.
PDF OCR is a simple drag-and-drop utility that converts PDFs and images into text documents. It uses advanced OCR (optical character recognition) technology to extract the text of the PDF or image. This is particularly useful for dealing with PDFs and images that were created via a scan-to-PDF function in a scanner or photo copier. It uses the Tesseract engine to perform OCR, and currently supports over 20 languages for OCR.
Monetra is a scalable payment processing engine for Linux, Unix, and Windows. It is designed to handle credit, debit, gift, EBT, and check authorizations and is certified to support major clearing house protocols. Features include support for multiple modems, multiple merchant accounts, and multiple processors, all simultaneously -- as well as IP and SSL connectivity along side SQL database support. Designed in C, conforming to POSIX standards, and utilizing light weight processes (threads), this product is able to handle a large number of transactions with high speed and minimal CPU usage.
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of a multimedia file derived from various features from its content. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the features are similar. Potential applications include copyright protection, similarity searches for media files, or even digital forensics.
RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.