Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Yeastar: Business Phone System and Unified Communications
Go beyond just a PBX with all communications integrated as one.
User-friendly, optimized, and scalable, the Yeastar P-Series Phone System redefines business connectivity by bringing together calling, meetings, omnichannel messaging, and integrations in one simple platform—removing the limitations of distance, platforms, and systems.
Time manager made with Qt4 and C++.
- Time management
- Modular
- GTD
- Interface for Unix and Mac Remind.
- Cross-Platform
- Saving SQLite
- Exporting
- PDF
- Plaintext
PHPMyGTD is (nearly) everything I've wanted after three years of GTD with inadequate tools. It offers dependent tasks, calendar exporting, a mobile interface, and useful context filtering.
...Put whatever is on your mind into the Brain Dump. Organize into a structured outline. Mark as actions, reference, or projects. Track your progress. The ideal tool for GTD, with its principles baked in at the core.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
A software that helps to arrange personal life, like finacne recording and analyzing, dairy writing, noting, calender, GTD arrangement, photo sharing and so on.
Mainly for test aim only.