Optimize every aspect of hiring with Greenhouse Recruiting
Hire for what’s next.
What’s next for many of us is changing. Your company’s ability to hire great talent is as important as ever – so you’ll be ready for whatever’s ahead. Whether you need to scale your team quickly or improve your hiring process, Greenhouse gives you the right technology, know-how and support to take on what’s next.
Learn More
Easy-to-Use Website Accessibility Widget
An accessibility solution for quick website accessibility improvement.
All in One Accessibility is an AI based accessibility tool that helps organizations to enhance the accessibility and usability of websites quickly.
Community driven projects featuring the latest innovations for cutting edge apps. Our flagship project JBoss AS is the leading Open Source, standards-compliant, Java EE based application server implemented in 100% Pure Java.
Jing, a Java based DAO (Data Access Object) framework, allows for a
clean seperation between the DAO layer and the Persistance layer.
Projects can swap persistance frameworks or use multiple frameworks
without \"rocking the boat.\"
Java utilities for J2EE projects
DAOFactory
XML parsing tools
Sub Projects
Fantasy Sports tools
Go - XML scripting API
Classpath - Swing app for managing the classpath
CORBA for Ruby.
The goal of this project is to create 100% pure Ruby CORBA implementation based on the <a href="http://sourceforge.net/projects/corba-ruby/">CORBA-Ruby Mapping Specification</a>.
There are 3 programs in this project. RIDL the IDL compi
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.