View

Sorting

Products found: 3109

logo
Offer a reference bonus
1.00

11th floor Software Development

11th floor is a niche IT services outsourcing provider focused on the pharmaceutical sector. We help our clients to subtly incorporate gaming elements into their presentations in order to bring some excitement into otherwise very serious lives of medical personnel. Our expertise lies in developing digital presentations, mobile applications as well as games, VR and AR. Here at 11th floor our work is our passion, and that is why we perfect every project that comes our way. We develop solutions for all mobile platforms as well as for most of the existing CLM systems.
... Learn more
-
-
ROI-
-
4
8
logo
Offer a reference bonus
0.00

1Password Manager

Every design decision in 1Password begins with the safety and privacy of your data in mind. It takes a combination of policy, innovative thinking, and a deep respect for your right to privacy. The information you store in 1Password is encrypted, and can only be accessed from a device you’ve already approved. And, as we can’t see the information you store in 1Password, we aren’t capable of giving it away, showing it to anyone, or using it for advertising. Your data is yours, and only you have the keys to unlock it. Encrypted Once. Twice. Thrice. Our security recipe starts with AES-256 bit encryption and uses multiple techniques to protect your data at rest and in transit.
  • Master Password. Not just the password you use to unlock your vault, it also plays a key role in encryption. Only you know your Master Password.
  • Secret Key. Also a star player in key derivation, this unique 128-bit identifier is generated locally. Only you have your Secret Key.
  • Secure Remote Password. A zero knowledge protocol that encrypts all traffic over the network. It also verifies the authenticity of the remote server before sending your information over TLS/SSL.
Secret Key: Better than Two Factor. Security professionals recommend using multiple authentication factors: “something you know”, like your password, and “something you have”, like an authenticator app on your phone. The Secret Key takes this idea to the next level. It doesn’t just authenticate you with our servers; it also plays a direct role in encrypting your data. That’s important, because it strengthens your Master Password exponentially. And since it never gets sent to us, your Secret Key can’t be reset, intercepted, or evaded. Trusted. Fast. Performant. Safe. 1Password is built with modern, open source libraries and industry-proven solutions. So you get lightning-fast performance, a technology stack you can trust, and top-notch reliability. 1Password runs on Amazon Web Services, the largest and most secure infrastructure provider on the planet. WebCrypto: Setting New Standards 1Password is the first and only password manager to use WebCrypto, the next generation standard from the W3C. WebCrypto provides direct access to the system’s secure random number generator, making truly secure cryptography possible in the browser for the first time. And did we say it’s fast? WebCrypto is over 10x faster than traditional crypto libraries, so you don’t have to wait to get first-class security. Transparent, Open Design. We document our entire encryption design so security experts from across the globe can review it. Here are just a few of the processes we document:
  • Tamper-proof, authenticated encryption using AES-GCM mode
  • Brute force protection using PBKDF2-HMAC-SHA256
  • Secure vault sharing using asymmetric cryptography
  • Key creation, derivation, and splitting techniques
We cover all these (and more) in great depth in our white paper. It’s a great read and stuffed with geeky details, illustrations, and fun stories. We highly recommend it.
... Learn more
-
-
ROI-
-
15
11
logo
Offer a reference bonus
1.00

247 Labs Software Development

247 Labs is a team of developers, designers, testers, product owners and architects focused to help businesses with their technology and engineering needs. We start by understanding your needs, learning about your pain points and if we find a good fit, we engage to help you deliver excellence.
We Specialize In Web Development Full stack, front end, back end, servers, APIs, Android, iOS, Windows, Mac, Linux, Ubuntu Phone. We have the experience and skills to build it right, the first time. We also take on failed projects and bring them back to life. Mobile Apps Mobile application development using cross-platform and native solutions.  Support for iOS, Android, watch and TV apps.  Integrating mobile devices with other technologies like bluetooth, geolocation and face recognition. Ecommerce Subscriptions, coupons, bookings, conferences, events, SaaS. From the Buy button to your bank account, we can connect all the pieces to allow you to analyze, track and focus on conversions to maximize your online sales. What Makes Our Solutions Standout: Creative Design User experience, interactions, wireframing & mockups. From online to print, complete brand development or mocking up your application idea, we work with your vision and turn it into a complete digital reality. Custom Applications Need a custom application for a startup idea or a business workflow optimization.  We take your requirements and help you through a procedure to develop the app into a real working solution. Quality Assurance Test plans, test cases, automation, fault analysis, performance, stability, regression, stress. Quality doesn’t happen by accident, especially in software. We will help you deliver a quality product to the marketplace every time. Product Management Requirements gathering is an essential part of every software development project.  We take you through brainstorming, workflow creation, user roles definition, wireframing and clearing defining your solution needs. Project Management A delicate recipe of agile, scrum, lean and water-fall project management methodologies.  Our PM process helps eliminate risk from software projects and deliver excellence on time and below budget. Support Your working solution needs ongoing features development, tweak support, bug fixes and maintenance.  Our team is there for your around the clock to help with support & provide recommendations to improve your digital needs.
... Learn more
-
-
ROI-
-
13
16
logo
Offer a reference bonus
0.00

24translate Translation memory systems

What is a translation memory system? The use of translation memory systems (or TMS) is an essential guarantor of quality in modern translation. In 'translation memories', a customer's existing translations are stored in the form of text segments that can be automatically retrieved by a translator working on a new translation. As such, there is no need to re-translate previously translated text segments, phrases and terms, an advantage that improves both the consistency of the translations and the translator's efficiency, while also reducing translation costs. In order to make the best possible use of these capabilities 24translate, working alongside 24technology, developed a TMS with a unique range of functions: 24|tcm. How do translation memory systems support our translators with their work? Like glossaries, translation memory systems are effective aides in the translation process. The decision as to how to translate a given sentence fragment, however, is still up to the translator. Our software does not replace the translator but rather supports them by providing access to intelligent memory and search functions. As such, our system continues to rely on quality work by specialist translators: Only when it is 'fed' with intelligent translations can it provide intelligent suggestions for translation. In practice, the individual translation segments are stored as a language pair consisting of source and target text, which is then automatically suggested in future translation projects bearing identical or similar text passages. All translators working for a specific company rely on the same translation memory (database). On the one hand, this significantly lowers translators' manual research efforts, while on the other it prevents deviation from specific terminology or phrases in subsequent translations and/or the work of additional translators. 24|tcm in use 24translate maintains a company-specific translation memory (abbreviated TM) for each of its clients. In order to provide customers with the full benefit of already existing translations, we will gladly maintain and store these at the beginning of our collaboration. Each new translation provided by us is then automatically stored in your translation memory. Clients may also access their translation memories and view existing translations at any time via various interfaces and tools (e.g. our customer portal). The advantages of a translation memory system
  • Eliminates double translations, leading to greater efficiency: Translators focus on 'new', previously untranslated text segments.
  • Saves the customer time and money: Translations can be delivered more quickly and at significantly lower rates.
  • Quality assurance: Consistency with regard to content and terminology is maintained at all times.
... Learn more
-
-
ROI-
-
16
16
logo
Offer a reference bonus
1.00

2Event

The main advantage of 2Event over hundreds of regular ticket sites is its all-in-one service, where you get 100+ useful features from one source. The platform contains the main functions for organizing events: registration of visitors, tickets, schedule, speaker schedule, networking (list of visitors, appointment of meetings), search for fellow travelers (people who go to the event and are coordinated with each other), polls and voting, Twitter Wall , badges with QR, push-mailing.

Basic functionality
  • Landing Page for your event: get a ready-made "landing page"
  • Simple registration of visitors via mail or social networks
  • Purchase tickets directly from your smartphone, with a minimum commission of 2.5%
  • Ticket and face scanners in smartphone: put an unlimited number of volunteers at the entrance with regular smartphones for control
  • Schedule and questions to speakers on the user's phone. In addition to interactivity, this is also saving on printing
  • Push notifications: send instant messages to your guests' smartphones with information about schedule changes, promotions or announcements of your next events
  • Polls, polls and contests, QR quests: get feedback, hold contests and sweepstakes from partners, engage your audience
  • Badges with QR: create your own ticket / badge design and use at your events
  • Analytics: get access to full event statistics 24/7, connect Google Ads and track conversions

Networking
  • List of visitors in the application and on the website. It can be seen who else will go to the event
  • Meetings: scheduling and scheduling meetings between event attendees
  • Correspondence between event participants: private and general chats, the ability to ask questions to speakers
  • Chat for the projector (Twitter Wall): a large screen on the wall, where posts of event visitors and all posts from social networks with the # hashtag of your event are broadcast in real time. Twitter Wall is one of the visitor attention centers and additional advertising space for sponsors

Advanced networking
  • Fellow travelers by car / taxi: visitors create groups by car / taxi or join existing ones to save money and get more time for communication
  • Travel Companions Between Cities: Scan your transport ticket and find out who else is someone from your city traveling to the same event in your carriage. This way you will find fellow travelers and meet like-minded people on the road.
  • Search for roommates among event participants: reduce living expenses, meet visitors from other cities and spend the night with them
  • Geolocation: look at the location of the event participants on the map. An indispensable feature if you are in an unfamiliar city
... Learn more
-
-
ROI-
-
0
0
logo
Offer a reference bonus
1.00

2muchcoffee Software Development

We offer web and hybrid application development service along with the full pack of supporting services. Quality assurance, project management and UI/UX design are fully integrated into our workflow to create successful products. Web Development We provide full-stack development services specializing in Angular, React and Node.js for the backend. We always adopt latest stable versions of available frameworks so that our clients receive modern features. App Development We focus on creating the hybrid, native and progressive web applications that run literally on every modern device you can find. React Native and Ionic toolset is what helps us to bring your app to the mobile web. UI/UX Design We make UI/UX design, draw wireframes and create prototypes for applications and websites. The usability and style are what we place at the heart of our approach. How we work Our company offers different types of connection models that can be adjusted and tuned depending on the project's unique requirements, tasks, budget and priorities. Agile Aproach. We make our business processes agile to avoid inefficiency and constantly improve the workflow. We consider every new challenge as an opportunity to improve our knowledge and bring better products to the market. Continous Delivery. We follow release cycles and schedule. But continuous integration platforms and practices we follow allow to deliver updates immediately if our clients need that. Active Communication. We always stay transparent and communicate all ups and downs to keep clients informed. You can choose what suits you best either regular or video calls or chats and emails. We value your time. Change Management. We are open to changes that bring benefits to the performance of our talented specialists. We take care of any people-related issues that may happen. Performance Index. We prepare frequent reports to help our clients understand the progress of the project and participate actively in making decisions. Personal Assistance. Our project managers are always ready to assist you with any matters that might come up. Clients satisfaction is our goal and we work hard to archive it.
... Learn more
-
-
ROI-
-
3
2
logo
Offer a reference bonus
1.00

360Learning

This Collaborative Learning platform relies on peer learning where anyone can elevate and respond to requests for knowledge, closing skills gaps faster. With it’s iterative training framework, minimum viable courses are shipped quickly and improved constantly by peers who identify out-of-date content or suggest additions.

Feedback & data from interactions within the course are also pushed to coaches on the platform, who facilitate peer learning by ensuring that courses are easily accessible, actionable & impactful. From onboarding new employees to training sales reps on a new product pitch, 360Learning aligns employee aspirations with organization expectations.

Overview of 360Learning benefits

360Learning Collaborative Learning platform reduces the feedback loop between expert & employee with lightweight reactions and qualitative forums for asking experts questions while allowing L&D to identify where courses are working and where they need work.

L&D leaders spend less time monitoring course completion (360Learning courses have a 90%+ completion rate) and more time demonstrating business impact.

With build-in Salesforce integration, L&D teams connect the dots between training & time-to-first deal, while our analytics dashboard tracks employee progress - giving them a nudge when they’re falling behind!

With HCM & TMS integrations, 360Learning enables you to evolve on top of our robust platform as an orchestrator of continuous learning throughout the organization.
Thanks to the dedicated sales enablement features, sales trainers using 360Learning to train their new reps also see great results:

  • 15% increase in quota attainment
  • 30% decrease in ramp up time
  • From $500k to $3m in yearly onboarding savings

Level up your sales team with 360Learning's Collaborative Learning Platform. Fast track new hires. Reps hone their script 10x faster with our digital role-play tool. Leverage your team's best examples. Continuously upskill your reps. Co-create impactful courses in just a few hours. Make them available at the point of need through our Salesforce connector and mobile app. Skyrocket sales performance: Demonstrate the impact of training on quota attainment through CRM integration.

360Learning is a learning engagement and training platform that provides learners and trainers with a commonplace to create a learning culture. It allows users to setup digital learning culture in less time and enables them to create online courses in just a few clicks. The platform uses social interaction, gamification and mobile friendly features to get learners engaged and involved in online courses. For trainers, it works more like a marketing and management platform and offers course optimizations, A/B testing and real-time tracking. The platform is being used by some key industry players that all aim to create a global digital learning culture within the organization. It allows trainers and experts to achieve more in less time and helps them become digital experts without having to go through lengthy technology lessons.

  • For Trainers and Experts

The platform is compatible with all web and media formats and allows organizations to reuse their existing resources. This allows businesses to leverage their existing best online content and helps them discover innovative formats that make it easier to produce new interactive content. The platform allows creating different kinds of evaluations, including open-ended and closed-ended questions. Trainers can also develop brainstorming sessions, business goals, collaborative activities, exams and more. Trainers and experts can be reviewed by the community, while the platform highlights such reviews to encourage participation. The platform uses a gamified ranking system, which makes it easier to identify top performers for each skill. Advanced tools promote continuous improvement by generating actionable suggestions for course improvement.

  • For Learners

360Learning involves learners in online courses on a day-to-day basis and helps increase engagement rates using gamification methods, which are inspired by popular web practices. Groups can be created based on different variables such as by class, by arrival date or by theme, while detailed analysis on these groups or communities can also be performed. The platform puts human interaction at the center of the training strategy by allowing effectively collaborating and innovating during the courses. All the features the platform has to offer are mobile friendly, which allows learners to access important stuff right from their mobile devices, and from anywhere.

... Learn more
-
-
ROI-
-
0
0
logo
Offer a reference bonus
0.00

360Suite Security and Administration

Identify who has access to what
  • View, manage and audit security
  •  

  • Document security (XLS, CSV, PDF)
  •  

  • View explicit, inherited and granular rights
  •  

  • Get a user-centric and object-centric view of security
  •  

Shorten time required for upgrades
  • Spend less time on administrative and analytic tasks
  •  

  • Bulk update crystal connections and report instances
  •  

  • Bulk re-point Webi (UNV to UNX, update BEx/BICS queries)
  •  

  • Update Webi variables en masse
  •  

Simplify audits and administrative tasks
  • Archive objects content & report instances (WID, PDF, XLS, CSV, text)
  •  

  • Automate any administrative task (update owners, purge reports, update recurring instances, etc.)
  •  

  • Clean up unused content and dormant users
  •  

  • Data Catalog for documents
  •  

Explore your content
  • Drill down capabilities with export
  •  

  • Replace Query Builder
  •  

... Learn more
-
-
ROI-
-
4
14
logo
Offer a reference bonus
0.00

3Ants

Our technology and our team work hard to protect your intellectual property. We have profound knowledge of how piracy is distributed and we have developed advanced technological tools especially design for content protection.
  • DETECTION. 3Ants has advanced and innovative software and processes specifically designed to protect your property and content from piracy.
  • ANALYSIS. 3Ants' software and team of experts studies the gathered data and offers specialziaed feedback to the processes so you have more sophisticated content protection methods.
  • DELETION. The tools 3Ants uses and its team is fully capable of deleting the links and the pirate content that put your intellectual property at risk.
We protect your brand on the Internet We offer a custom-made solution and top quality content protection.
  • Brands and companies. We prevent the dishonest use of your brand by watching over your online reputation. With innovative methods, we protect your brand's image and the use of your identity to improve your consumers' opinion of you.
  • Digital contents. We offer content protection of the best quality by removing the illegal copies and unauthorized sharing. We also redirect the user to legal pages where they can purchase your product or find information on it.
  • Physical Products. We work to increase and protect your legal sales, as well as to eliminate forgeries in online sales.
... Learn more
-
-
ROI-
-
19
20
logo
Offer a reference bonus
0.00

3D Warehouse

With over 4 million models and 23 million users every year, 3D Warehouse is the world’s largest and most popular repository of free 3D models. It is an open library where anyone using SketchUp Pro can download and share.

A community for all
Anyone can search, download models from, and contribute content to 3D Warehouse, for free. The world’s largest 3D content platform features direct integration with SketchUp Pro and compatibility with CAD apps.
Sharing is caring Not every model in 3D Warehouse has to be shared; private items are accessible only to you. Public models can be searched and downloaded. Models can be organised into collections and shared to social media.
Content marketing platform 3D Warehouse offers product manufacturers a unique way to showcase catalogs, allowing prospects to specify product into their own designs. The 3D model is a native channel to reach and engage new customers.
Certified content development SketchUp has built a strong network of Certified Content Developers; together they are equipped to build professional models for those organisations seeking to get their content noticed on 3D Warehouse.
... Learn more
-
-
ROI-
-
1
0
logo
Offer a reference bonus
1.00

3DEXPERIENCE platform

With a single, easy-to-use interface, it powers Industry Solution Experiences – based on 3D design, analysis, simulation, and intelligence software in a collaborative, interactive environment. It is available on premise and on cloud. Dassault Systèmes offers industry-leading applications delivered on the 3DEXPERIENCE platform: Design & Engineering, Manufacturing & Production, Simulation, Governance & Lifecycle, 3D Design Experience for Professionals, as well as a broad catalog of services.
... Learn more
-
ROI-
-
5
5
logo
Offer a reference bonus
0.00

4iQ IDHunt

The only way to stop cyber-enabled crimes is to unmask whoever is truly behind it. By identifying bad actors, you can recover funds, freeze accounts, takedown infrastructure — and, most importantly, thwart additional attacks and exploitations. For even the most advanced intelligence operations, however, identifying threat actors can be a slow and difficult process. And one with many dead ends. That’s where 4iQ IDHunt comes in. We help investigators analyze monikers or pseudonyms and other identity related attributes, connect the dots and unmask bad actors around the globe, by combining open source intelligence and our one-of-a-kind 4iQ IDLake. 4iQ IDHunt Core IDHunt Core is an easy to use web application for intel analysts to analyze personas, enhance attribution analysis, and uncover the real identities behind criminal activities.
  • Targeted Threat Analysis. Instead of searching for a needle in a haystack, investigators start with what they already know – suspected bad actors – and search the 4iQ IDLake to begin making connections.
  • Accelerate Findings. 4iQ has spent years curating and verifying billions of identity records, so that you can more efficiently unmask adversaries — sometimes within a matter of hours.
  • Analytics. A single actor analysis can require hundreds of pivots. With 4iQ IDHunt, you can automatically connect the dots, generate graphs and calculate maliciousness scores in seconds.
  • No Training Required. 4iQ IDHunt application is simple. Using an intuitive interface, Investigators can search and immediately start seeing results with no prior training.
4iQ IDHunt Enterprise IDHunt Enterprise (unified OSINT and DARKINT) is software that can be deployed in the cloud or on-premise. It provides intel analysts complete control over the full intelligence cycle; from defining custom threat models and collection plans to dynamic taxonomies and dashboards for ongoing investigations. With IDHunt Enterprise, intel units can discover the real identity behind bad actors, configure collections, gather information and fuse data from across the surface, social, deep and dark web, internal file systems and third party data sources in order to prevent and disrupt attacks. Multiple Missions Supports multiple investigations across Fraud, Financial Crime, Cyber and Corporate Security units. Complete Control Tailor data to every part of the full intel lifecycle. Simply configure thousands of sources, collection schedules, dynamic taxonomies, and real-time queries. Collection Engine Large portfolio of built-in collectors can scan surface, social, deep, and dark web, as well as internal email and file systems. Turnkey Solution No integration required. Get Cyber and Corporate Security units up and running quickly.
... Learn more
-
-
ROI-
-
6
0
logo
Offer a reference bonus
1.00

6Connex Platform

Unlimited possibilities
6Connex is a virtual platform like no other — with the robust flexibility needed to create any interactive environment in the cloud. You have the ability to power fully-remote and hybrid events for Marketing, Sales, HR, Business Development, and more.

Attendee-centric experiences
Attendees can easily interact with advanced engagement tools, such as 1:1 chat, video chat, gamification, social sharing, and webcasting, while leveraging our sophisticated A.I. technology that allows for a unique, personalized event experience with content-matching and networking opportunities.

Enterprise-level security
As the virtual event industry’s leader in security and privacy, many of the world’s most admired companies have put their trust in our security and privacy protocols. We comply with the most stringent enterprise security requirements with features including whitelisting, blacklisting, and secure cookie handling.

Actionable insights

Track activity and ROI with 24/7 access to 35+ real-time reports. Understand the Who, What, Where, and When for every activity in your virtual environment. Provide your sponsors with actionable data that allows them to target campaigns accurately. Key features of 6Connex: Unmatched Scalability with Enterprise Level Security The 6Connex platform is ISO 27001 certified, offering a secure virtual environment with unlimited capacity and flexibility to host any hybrid or virtual use case.

The Perpetual VE Concept

The 6Connex platform handles multiple use cases, allowing customers to repurpose the Environment and leverage their long-term license to support multiple engagements in a single location.

Immersive Experience
Our environment templates and navigation design drive attendees through a unique immersive experience, delivering a new level of engagement and virtual experience.

Open VE Universe

6Connex’s platform is technology agnostic allowing clients to bring the tools they use day-to-day and are approved by their IT protocols to integrate with our platform and drive engagement.
... Learn more
-
-
ROI-
-
15
8
logo
Offer a reference bonus
0.00

6Scan

6Scan is a full service security solution for you website. Patent-pending technology combines a full suite of features that scan and automatically fix critical issues that - if left unresolved - could damage your business and customers, your reputation and destroy your web presence.        

What Does 6Scan Do?

  1. Find. The 6Scan six independent scanners work to detect vulnerabilities, scan for malware and inspect your website's files to determine any security issues or risks.
  2. Fix. Patent-pending technology automatically fixes any security issues as soon as they are detected. We deploy a WAF (Web Application Firewall) and custom vulnerability patches to make sure any attack vectors are blocked. The entire process of detecting and fixing vulnerabilities is fully automated, managed through a unified dashboard.
  3. Protect. 6Scan will continue to monitor your site for new vulnerabilities and security risks. The scanning is scheduled automatically or can be triggered manually and you will be notified of any issues. As with all our services, this process can be monitored from your dashboard where you have the opportunity to roll back any changes.
Malware Scan. A complex scan that runs a number of different tests to detect any signs of malware on your website. The 6Scan malware scan deploys a much larger set of tests than most of the simple or embedded scanners to make sure that even the latest emerging threats are detected.                         Malware Removal. A service to restore your website after a malware attack. 6Scan's security experts will access your website and remove any malicious code or backdoors.             Server-Side Scan. A scan and examination of the files on your hosting account for any signs of backdoors or hidden malware code which could be used to compromise your website.             Website Scan. Detects vulnerabilities that could make your site a target for attacks. The proactive service works seamlessly in the background to maintain website security.                                     Auto Vulnerability Repair. Patent-pending patching technology acts immediately to resolve problems with vulnerable website code. Left unchecked these issues become entry points for hackers to gain access to your website.                                         CMS Scan/Repair. Automatically repairs problems created by outdated and vulnerable plug-ins and content management systems such as WordPress, Drupal, and Joomla, used by millions of websites.

... Learn more
-
-
ROI-
-
17
3
logo
Offer a reference bonus
1.00

7devs Software Development

We are a company that holds top-notch experts in Development, Design, Quality Assurance and Project Management. Our philosophy is built on the next 7ven principles: 1. We are devoted: We follow 'one team — one project' rule. This approach is the most effective way to develop your project. As follows our clients have an entire power of professional team at their hands. We treat your business ideas as ours, so you can be sure that all of our members understand the importance of each small detail of the product. 2. We know what we do: We have gathered the most dedicated professionals in the country who know how to do their work efficiently, to meet our client's needs. We consult, support and suggest you the best way to bring your idea up to the highest standards. 3. We listen: The first thing that marks us out among others is a highly attentive approach. You talk- we listen. First of all, we outline all the points to be sure that we are on the same page. A dedicated project manager will be assigned to working on your project and will be able to solve any issues appearing during the whole development process. 4. We're friendly: We treat our clients as our friends, we rely on the long-term relationships and always propose beneficial conditions for our customers. 5. We work fast: Our mission is to deliver the best products as fast as possible but without any impact on the quality of the delivered product. Our team spends 1 to 5 days in-depth analysis of your product idea. Right after we are done, you receive a strategy document and a delivery plan. 6. We support: Even if you have only a plain idea it's enough for us to create a beautiful product using outstanding solutions only. We're a full-lifecycle software development company, so you can expect:
  • constantly growing and expanding functionality;
  • scalable infrastructure;
  • redesign according to the latest trends;
  • clean code and its maintenance during the whole process of our collaboration.
7. We're cost-effective: We suggest you a 'clever' price it means that even though it's above average it's definitely cost-effective. We offer fair rates and a systemized approach to our work so you can concentrate on your main business activities and be sure that your project will be delivered flawlessly right in time.
... Learn more
-
-
ROI-
-
4
11
logo
Offer a reference bonus
0.00

802 Secure AirShield

The 80% of edge computing is wirelessly enabled today across devices, networks, and IoT. This evolution requires a new level of visibility across not only the IT network but the surrounding Physical environment (off-network systems). Gartner and NIST refer to this as Cyber-Physical Security. The lack of Physical visibility, management, and security exposes organizations to risks including unmanaged, Shadow IoT, and adversarial devices such as wireless thermostats, Smart TVs, spy cameras, drones, rogue cell towers, wireless storage devices, and much more. AirShield Solution 802 Secure’s AirShield is an autonomous and non-intrusive wireless monitoring solution that provides immediate visibility and protection across the Cyber-Physical space. AirShield provides scans across multiple wireless protocols and frequencies to detect wireless devices and networks and protect against misconfigurations, Shadow IoT, unknown and unmanaged IoT devices, and previously undetected adversarial attacks. This is accomplished using wireless deep packet inspection, situational awareness, zero trust security, anomaly detection, machine learning, and behavioral analysis.
... Learn more
-
-
ROI-
-
12
11
logo
Offer a reference bonus
1.00

8allocate Software Development

We are a technology-agnostic b2b ecosystem that delivers value-based scalable custom software solutions by leveraging a unique consultative approach, account-based recruitment, and a trusted resource network. We provide scalable end-to-end software engineering solutions for companies around the world, from short- and mid-term fixed-price and T&M projects to extended/remote dedicated Agile teams. Regardless of your company size, project scope and budget, we treat all clients equally and guarantee that we’ll deliver on time, on budget, and with the highest possible quality of service. High-quality code is at the heart of each solution we deliver. We don’t use any bench resources; as a client, you get an exclusive team’s setup based on your allotted budget and project specific requirements! All tech talents involved in your project development are committed to helping you reach your goal and solve your issue. This is our promise and guarantee! When we build software, we always think about how it’ll help your business prosper, increase your top-line growth and bottom-line savings. Whether you’re looking to build a software product from scratch, boost your in-house/onshore team’s capacity with auxiliary tech talent and external expertise, or outsource your entire R&D offshore – we have different value propositions to get you covered and help you successfully achieve your digital transformation and other business goals.
... Learn more
-
-
ROI-
-
13
7
logo
Offer a reference bonus
1.00

A-listware Software Development

A-listware is a Ukrainian technology company delivering exclusive onboarding and escorting of your remote engineering teams. We consult you on the Ukrainian IT market and help set up the team of great and trustworthy employees in addition to the them being top technical talent. Your remote engineering team is hand-picked and fully integrated into your processes and workflow. We offer your engineers with the relevant experience in the business domain you operate. You get the loyal and initiative engineers prescreened by our HR, Tech Lead and PM from 100 000 UA engineering market and may choose to either manage your team directly and have your Software Development Extension in the Distributed Environment or get the Managed Software Development Team of Overall Lifecycle. We are your remote eyes and curate the whole process in Ukraine – you know the upsides and downsides of the candidates and workflow, first thing they come up. We also provide hourly support for short-term projects and startups. We understand that main needs of startups is a lack of top level technical resources, urgency and budget issues. As a solution we can suggest part-time specialists of PhD/Architect/Lead level to develop MVP/prototype/demo versions of the products of the Customer and support the Customer on his/her way to make this prototype work. In terms of technology stack these resources can utilize Python, C++, Computer Vision, Machine Learning, Javascript, iOS/Android development. Get in touch with our A-list Engineer to have the best opinion! Expertise Mobile Development Image and video processing, maps and positioning, live streaming, web application extensions, real-time data. Web Development Enterprise Solutions, eCommerce Solutions, Social Media Websites, Widgets, Browser Extensions, Single-page Application. Cloud Computing Amazon Web Services, Azure Web Services, CI/CD. Embedded Development Linux Kernel & BSP development, ROS, DSP, Real-Time Operating Systems, ARM, FPGA, SMB. Artificial intelligence Machine Learning, Computer Vision, NLP, OpenCV, Data Science. AR/VR ARML, ARToolKit, Apple ARKit, Wikitude, HMD, OpenGL, Unity.
... Learn more
-
-
ROI-
-
19
13
logo
Offer a reference bonus
1.00

A10 Thunder® ADC

ADVANCED SERVER LOAD BALANCING Complete full-proxy L4-7 load balancing with customizable server health checks and aFleX® L7 scripting. GLOBAL SERVER LOAD BALANCING (GSLB) Extend load balancing on a global basis to enable worldwide business continuity with faster, localized server responses. APPLICATION DELIVERY PARTITIONS (ADP) 1,000-plus partitions offer the highest-density, multi-tenant solutions for customizable policies and appliance consolidation. SSL OFFLOAD WITH PFS AND ECC Perfect Forward Secrecy with a full cipher suite, including Elliptic Curve, provide SSL offload at the industry’s highest levels. APPLICATION ACCELERATION AND OPTIMIZATION Caching, compression and TCP reuse combine to expedite content transfer for enhanced app performance. WEB AND DNS PROTECTION Secure services and meet compliance targets better with single sign-on, web and DNS firewalls, and DDoS protection. PER-APPLICATION ANALYTICS Integrate with the A10 Harmony™ Controller for visibility into user experiences, traffic profiles and health checks to improve performance. AXAPI® REST-BASED PROGRAMMABILITY Configure all features with 100 percent API coverage and enable third-party management.
... Learn more
-
-
ROI-
-
5
4

The ROI4CIO Product Catalog is a database of business software, hardware, and IT services. Using filters, select IT products by category, supplier or vendor, business tasks, problems, availability of ROI calculator or price calculator. Find the right business solutions by using a neural network search based on the results of deployment products in other companies.