[go: up one dir, main page]

Suggested Categories:

Web Accessibility Testing Tools
Web accessibility testing tools are designed to evaluate websites and applications for compliance with accessibility standards such as WCAG, Section 508, and ADA. They scan and analyze elements like color contrast, keyboard navigation, semantic structure, and screen reader compatibility to ensure digital content is usable by people with disabilities. Many tools provide automated reports, recommendations, and simulations of accessibility barriers to guide developers in fixing issues. They are used by web designers, developers, and compliance teams to create inclusive digital experiences and reduce legal or reputational risks. By integrating into workflows, these tools help organizations continuously monitor, test, and improve accessibility across web properties.
Trade Promotion Management Software
Trade promotion management software helps businesses plan, execute, and analyze trade promotions to drive sales and improve marketing ROI. These platforms provide tools for creating promotional campaigns, managing budgets, tracking performance, and measuring the effectiveness of promotions across different retail channels. Features often include forecasting, invoice reconciliation, and collaboration with retailers, ensuring that promotional offers are delivered as planned. By using this software, organizations can optimize promotional spending, prevent errors, and ensure alignment with overall business goals. It also helps businesses maximize return on investment (ROI) and maintain strong retailer relationships.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.

36 Products for "tpm 2.0" with 1 filter applied:

  • 1
    Auth0

    Auth0

    Okta

    .... Authenticate users across all applications with a customized, secure, and standards-based single login. Universal Login connects users to a central authorization server. Credentials aren’t transferred across sources, which boosts security and protects against phishing and credential stuffing attacks. OAuth 2.0 recommends that only external user agents (like the browser) be used by native applications for authentication flows. Auth0’s Universal Login achieves this while enabling SSO.
    Leader badge">
    Starting Price: Free plan
  • 2
    Glassware

    Glassware

    Glassware

    Optimized for simplicity, flexibility and scalability, Sphere 3D’s Glassware 2.0 platform eliminates the complex tasks of designing, implementing, and maintaining application hosting environments, extending the benefits of secure scalable server-based computing to all. Glassware 2.0 extends the useful life of applications by decoupling the application from the underlying operating system. Glassware 2.0 can virtualize 16, 32, and 64-bit Microsoft Windows applications* and deliver them...
  • 3
    Amazon AppStream
    Amazon AppStream 2.0 is a fully managed non-persistent desktop and application virtualization service that allows your users to securely access the data, applications, and resources they need, anywhere, anytime, from any supported device. With AppStream 2.0, you can easily scale your applications and desktops to any number of users across the globe without acquiring, provisioning, and operating hardware or infrastructure. AppStream 2.0 is built on AWS, so you benefit from a data center...
  • 4
    Google Shielded VMs
    Shielded VMs are virtual machines (VMs) on Google Cloud hardened by a set of security controls that help defend against rootkits and bootkits. Using Shielded VMs helps protect enterprise workloads from threats like remote attacks, privilege escalation, and malicious insiders. Shielded VMs leverage advanced platform security capabilities such as secure and measured boot, a virtual trusted platform module (vTPM), UEFI firmware, and integrity monitoring. Quickly protect VMs against advanced...
  • 5
    Owlytica

    Owlytica

    Owlytica

    IT resellers face the very complex process of selling, tracking and renewing IT assets - but it doesn't have to be this way. Going beyond simply quoting, Owlytica simplifies the process of selling and renewing IT assets, converting line items into valuable assets for contract, renewals, ticketing and upselling. Now IT resellers can have a tool to streamline operations and enhance profitability. Ideal for VARs and MSPs, get quoting, renewal management and IT asset management in one...
  • 6
    PureOS

    PureOS

    PureOS

    A user friendly, secure and freedom respecting OS for your daily usage. With PureOS, you are the only one in control of your digital life. We've created a new, more stable version of PureOS, with the same great privacy protecting features and software but with a more solid foundation. Greater stability through following a stable upstream. New security and update software channels. New tooling for managing older versions of TPM chips. Changes to make the Librem Key work out of the box. Lots...
  • 7
    CloudCover CoverIT
    CoverIT is a modular, API‑driven IT lifecycle management platform designed to integrate seamlessly with your existing software and vendor portals. It offers three core applications; ContractHub for centralized tracking of OEM and TPM contracts and assets with automated renewal reminders; ServiceHub for real‑time ticket management, live messaging updates, and end‑to‑end work order workflows; and QuoteHub for faster, more accurate quote generation, with optional white‑labeling to extend your...
  • 8
    Cameo Enterprise Architecture
    No Magic has deep experience with DoDAF 2.0, MODAF, NAF 3 and UAF. Our Cameo Enterprise Architecture product, based on our core product MagicDraw, offers the most robust standards compliant DoDAF 2.0, MODAF, NAF 3, NAF 4, and UAF 1.0 via a UAF standardized solution. And what's more, No Magic fully supports all architectural framework products ensuring you achieve project results. No Magic also leads the industry in its integration in systems of systems engineering, ensuring that you achieve net...
  • 9
    azk

    azk

    Azuki

    What’s so great about azk? azk is open source software (Apache 2.0) and will always be. azk is agnostic and has a very soft learning curve. Keep using the exact same development tools you already use. It only takes a few commands. Minutes instead of hours or days. azk does its magic by executing very short and simple recipe files (Azkfile.js) that describe the environments to be installed and configured. azk is fast and your machine will barely feel it. It uses containers instead of virtual...
  • 10
    Apache ODE

    Apache ODE

    Apache Software Foundation

    ... business processes. It defines a set of basic control structures like conditions or loops as well as elements to invoke web services and receive messages from services. It relies on WSDL to express web services interfaces. Message structures can be manipulated, assigning parts or the whole of them to variables that can in turn be used to send other messages. Side-by-side support for both the WS-BPEL 2.0 OASIS standard and the legacy BPEL4WS 1.1 vendor specification.
  • 11
    Mongoose OS
    Mongoose OS is open source and comes in two editions: Community and Enterprise. Reliable Over-The-Air updates Secure device provisioning Remote management. Trusted, field-tested, proven performance. Open source under Apache 2.0 license. Commercial licensing & support are available. integrated into thousands of commercial products deployed to hundreds of millions of devices in production environments. Mongoose OS is Google Cloud IoT Core Partner. Microsoft Azure IoT recommends Mongoose OS...
    Starting Price: $0.89 per unit
  • 12
    Rocky Linux

    Rocky Linux

    Ctrl IQ, Inc.

    ... generation federated computing stack. - Rocky Linux, open, Secure Enterprise Linux - Apptainer, application Containers for High Performance Computing - Warewulf, cluster Management and Operating System Provisioning - HPC2.0, the Next Generation of High Performance Computing, a Cloud Native Federated Computing Platform - Traditional HPC, turnkey computing stack for traditional HPC
  • 13
    RAFT

    RAFT

    Compassites Software Solutions

    ...) on web pages using WCAG 2.0, Section 508 and Google accessibility audit rules to conform with Americans with Disabilities Act (ADA) standards. Do not have accessibility testing support. Ready to use tested framework. Test for ADA compliance via accessibility audits.
  • 14
    OpenText Vibe
    Keep your employees informed through a social and collaborative Intranet that improves awareness and contribution using Web 2.0 technologies. Team workspaces enable you to create digital offices where local and global team members can gather online to coordinate their efforts. Personal workspaces enable you to create your own online work environment, customized to your own needs. Use Vibe to augment or replace an existing intranet. With drag-and-drop ease, your teams can create custom landing...
  • 15
    Procurement Service Bus (PSB)
    ... an AccessPoint As A Service (APAAS). We connect the Peppol network with the enterprise systems. The interface is based on REST with OAUTh 2.0 layer. The API’s are self explanatory and made visible with the OpenApi UI. The swagger.json file can be downloaded on top of the OpenAPI UI main page and can be used to generate code for several languages. If you choose to generate code, we recommend using OpenAPI Generator.
  • 16
    (R)?ex

    (R)?ex

    (R)?ex

    ... and friendly for incremental automation. This means whenever you reach the limitations of the built-in Rex features, a powerful programming language and module ecosystem is always at your fingertips to seamlessly extend it with modules from CPAN or with your own code. We believe in the idea of open source. So Rex, and all its parts are released under the Apache 2.0 license. You're invited to join the community to make Rex better and better.
  • 17
    Alibaba Cloud Drive

    Alibaba Cloud Drive

    Alibaba Cloud

    ..., recognize, and re-categorize file metadata and support massive data queries based on Alibaba Cloud’s AI capabilities to understand unstructured data. Ensure data security with server-side data encryption, HTTPS 2.0-based transmission, end-to-end data validation, flexible authorization methods, and file watermarking functions.
  • 18
    Wave Terminal

    Wave Terminal

    Command Line Inc

    ... to allow users to bring their own AI (BYOLLM) in the future. - Licensed under the Apache 2.0 license, with packages available for both macOS and Linux.
    Starting Price: $0
  • 19
    WebIssues

    WebIssues

    WebIssues

    .... It requires version 2.0 of the WebIssues server. Read the WebIssues Guide for more information about installing and using WebIssues. If you have problems related to WebIssues, please visit the Support forum. Ideas and suggestions for improvements can be submitted using the Feature requests forum. Use the Issues tracker on GitHub to submit bugs. Join the WebIssues Team, an open-source community of developers and translators, and contribute to the project.
  • 20
    Nokia VitalSuite
    Nokia VitalSuite® Performance Management software is a multivendor, multi-application performance management solution providing both historical and near-real-time views covering everything from Network Devices and Servers to VoIP and Web traffic to mission-critical applications and network resources. The solution proactively monitors performance and provides views via an easy-to-use Web 2.0 GUI. It supports both IPv4 and IPv6 network environments. VitalSuite has several major software modules...
  • 21
    Apache Syncope

    Apache Syncope

    Apache Software Foundation

    Apache Syncope is an Open Source system for managing digital identities in enterprise environments, implemented in Java EE technology and released under Apache 2.0 license. Identity management (or IdM) means managing user data on systems and applications, using the combination of business processes and IT. Computers work with records of data about people. Such records contain technical information needed by the system for which the account is created and managed. Have you ever been hired...
  • 22
    IT-BRAMA Corporate Portal

    IT-BRAMA Corporate Portal

    IT-BRAMA Enterprise Portal Solutions

    IT-Brama Standard is optimally suited for those companies that, due to the exceptional specifics of their activities or as unnecessary, do not need to use templates and standard business process routes. As in IT-BRAMA Basic, the corporate portal IT-BRAMA Standard implements the concept of Enterprise 2.0 using a set of proprietary tools. In addition to the functionality implemented in IT-BRAMA Basic, IT-BRAMA Standard includes document management core mechanisms with mechanisms for visually...
    Starting Price: $1,500 one-time payment
  • 23
    NCache

    NCache

    Alachisoft

    NCache is an open source distributed cache for .NET Framework & .NET Core (released under Apache License, Version 2.0), by Alachisoft. NCache provides an extremely fast and linearly scalable distributed cache that caches application data and reduces expensive database trips. Organizations use NCache to remove performance bottlenecks related to their data storage and databases and can scale their .NET and Java applications to extreme transaction processing (XTP). NCache Open Source gives...
    Starting Price: $995.00
  • 24
    SoftEther VPN

    SoftEther VPN

    SoftEther Project

    SoftEther VPN Project develops and distributes SoftEther VPN, as an academic project from University of Tsukuba, under the Apache License 2.0. The API Suite allows you to easily develop your original SoftEther VPN Server management application to control the VPN Server (e.g. creating users, adding Virtual Hubs, disconnecting a specified VPN session) from JavaScript, TypeScript, C# or other languages. SoftEther VPN ("SoftEther" means "Software Ethernet") is one of the world's most powerful...
  • 25
    Afterlogic Aurora
    ..., along with OAuth 2.0 authentication and resources, like Google Drive or Dropbox.
    Starting Price: $99.00/one-time
  • 26
    Spacelift

    Spacelift

    Spacelift

    ... circumstances) and what their level of access to each of the managed projects should be. Spacelift ships with SSO support out of the box, supporting every identity provider that speaks SAML 2.0 protocol. Puts policy-as-code in the center with Spacelift’s robust policy framework built on top of Open Policy Agent. Spacelift uses policy-as-code to allow you to declare rules around your infrastructure.
    Starting Price: $250 per month
  • 27
    Clyton

    Clyton

    Gammadyne Corporation

    Clyton is an email client with advanced security and spam filtering features. The spam filter is highly configurable and supports DNS blacklist checking (DNSBL). Expect 85% of spam to be eliminated with the default configuration. Email that is suspicious but not obviously spam is quarantined for 24 hours and then retested, providing the blacklist enough time to react to new spam sources. The built-in address book supports personalized mass-mailings. Received email cannot run scripts,...
    Starting Price: $29
  • 28
    Intel Server Management
    ...-users to monitor and manage servers either through management software they build on their own, existing solutions such as Intel® Data Center Manager and Intel® Server Utilities, or by third-party tools. Extensive Redfish schemas available to manage, update firmware and view asset inventory. Legacy protocols like IPMI, SNMP, SMTP are fully supported on the platform. IPMI is 2.0 compliant with several additional OEM commands included, as well.
  • 29
    WSO2 Enterprise Service Bus
    ... messages with XSLT 1.0/2.0, XPath, XQuery, and Smooks. Visual data mapping, CSV, JSON, and XML transformation connectors. Supports any RDBMS, CSV, Excel, ODS, Cassandra, and Google spreadsheets. Supports OData v4 protocol for any RDBMS and Cassandra data sources. Supports MSSQL, DB2, Oracle, OpenEdge, TerraData, MySQL, PostgreSQL/EnterpriseDB, H2, Derby or any database with a JDBC driver. Support for nested queries across data sources.
  • 30
    GlusterFS

    GlusterFS

    Gluster

    ... environments. Gluster is used in production at thousands of organisations spanning media, healthcare, government, education, web 2.0, and financial services. Scales to several petabytes, handles thousands of clients, POSIX compatible, uses commodity hardware, can use any ondisk filesystem that supports extended attributes, accessible using industry standard protocols like NFS and SMB, provides replication, quotas, geo-replication, snapshots and bitrot detection, and more.
  • Previous
  • You're on page 1
  • 2
  • Next