Workspace management made easy, fast and affordable.
For companies searching for a desk booking software for safe and flexible working
The way we work has changed and Clearooms puts you in complete control of your hybrid workspace. Both meeting rooms and hot desk booking can be easily managed to ensure flexible and safe working, however big or small your organisation.
Learn More
Optimize every aspect of hiring with Greenhouse Recruiting
Hire for what's next.
What’s next for many of us is changing. Your company’s ability to hire great talent is as important as ever – so you’ll be ready for whatever’s ahead. Whether you need to scale your team quickly or improve your hiring process, Greenhouse gives you the right technology, know-how and support to take on what’s next.
BEYE (Binary EYE) is a free, portable, advanced file viewer with built-in editor for binary, hexadecimal and disassembler modes. It contains a highlight AVR/Java/i86-AMD64/ARM-XScale/PPC-64 and other disassembler, full preview of MZ,NE,PE,ELF and other.
This application shows daily meals listing available on all 5 mensa's across TU Darmstadt Campuses in Darmstadt on android based smart phones.
The app works by loading the content from mensa websites, parses it and displays the result on android UI.
Jarrut is a tool that makes developing and debugging Java ME applications (application using CLDC to be more specific) a bit less of a pain. Jarrut enables proper stack traces for exceptions, also when running a MIDlet on a real device
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
3A-TRE evaluates traditionally logical expressions under 3 assumptions
...In this case, the dependent test modules are always assumed to be true when their results are not available. We call this a stub assumption (SA).
3A-TRE example:
echo "CWA: (T and U)" | java -jar PTRE.jar
Result: F
3A-PTRE example: (P means possible results)
echo "OWA: (T,U and U,F)" | java -jar PTRE.jar
Result: U,F