Regpack is a powerful onboarding, registration, and payments platform trusted by thousands of organizations worldwide. Our mission is simple: to give you the tools to automate busywork, streamline your processes, and keep your focus where it belongs, on growing your programs and serving your clients.
Quant offers a wide range of solutions for retail. Within one integrated software system, it allows you to efficiently combine the management of retail space, shelf labels and marketing materials with task management, reporting and automatic replenishment.
IRAlarm is a lightweight alarm application for Pocket PCs and Smartphones where you can set an infinite number of alarms which will play mp3 files on trigger. It supports snooze with configurable interval for each alarm, days from the week when to run.
google calendar sync app for WM5
Uses XML, simple XPath, .net compact framework 2.0 to retrieve google calendar feed, check against the appointments stored on the phone and adds/updates/deletes accordingly.
UniSync will allow you to run a synchronization server that communicates using the SyncML protocol (www.syncml.org) using accessor modules for Palm, WinCE, Outlook, etc. Web and WAP portals will allow you to access data from anywhere.
All-in-one organizer (todo lists, events, shopping lists, reminders...) written as a desktop application + PocketPC version. Ability to synchronize data on desktop and Pocket PC.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.