Planfix: Manage Projects, Team's Tasks and Business Processes
All-in-One Enterprise-Level Software is Now Available for SMB
Planfix is like a souped-up business process management system for folks who really know their stuff. It's built to help you dive deeper and gives you more options than your run-of-the-mill project and task management systems. Best part? Even small businesses and non-profits can get in on the action.
Learn More
Create custom docs, forms, apps, e-signatures, and surveys with Titan.
Powerful no-code digital experiences for Salesforce
Create custom docs, forms, apps, e-signatures, and surveys with Titan’s full-suite of enterprise applications designed to integrate seamlessly with Salesforce data across your entire organization. #1 on the Salesforce appexchange
A Pure Java implementation of Swing GUI, with Layouts, Borders, Renderers and lots of components including inline TextField, Buttons, Window, TabbedPane and many others. ALL visual and behavioural aspects can be fully customised of ANY component.
Development of user interfaces (clients) for the w1-fi web service.
w1-fi is a web content system for cell phones with user accounts, localization in maps, upload of images/videos, and selling products through online payment gateways like paypal.
The Touchscreen User Interface for J2ME is a small framework, designed to create user interfaces with low-level components and layouts. The components are controllable by touchscreen devices only.
Class PictFont allows you to use custom fonts in your MIDlet for mobile phone. Fonts may be proportional, multi-colored or even animated. You can use several fonts in one MIDlet. Fonts can be loaded from jar-file or from the net or from Record Store.
Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes.
Track your GenAI risk, run multichannel deepfake simulations, and engage employees with incredible security training.
Assess how your company's digital footprint can be leveraged by cybercriminals. Identify the most at-risk individuals using thousands of public data points and take steps to proactively defend them.