Suggested Categories:

Language Learning Software
Language learning software offers structured programs designed to teach users new languages through interactive lessons and exercises. These platforms typically include modules for grammar, vocabulary, pronunciation, and listening comprehension, helping learners build foundational language skills. Many language learning software options utilize multimedia tools, such as audio, video, and quizzes, to reinforce lessons and keep users engaged. Some software also offers tracking features to monitor progress and set personalized learning goals. With the flexibility to learn at one's own pace, these tools make it possible to study languages from beginner to advanced levels, often providing support for multiple languages.
Programming Languages
Programming languages are a set of rules that form a language that programmers and developers can use to write software, applications, web apps, mobile apps, scripts, and more.
Natural Language Processing Software
Natural language processing (NLP) software analyzes both written and spoken human languages and interprets them for translation, deep learning and automation purposes. Natural language processing software may also include natural language understanding (NLU) capabilities.
Natural Language Generation Software
Natural language generation software is computer-generated software designed to create natural-sounding output. It can generate text from structured data sources such as databases, or from unstructured sources like audio or video recordings. The output of this software can be used for various tasks such as summarizing information or producing news articles. Natural language generation technology is commonly used in applications that require automated content creation and natural language processing algorithms.
Scripting Languages Software
Scripting languages are programming languages that are used to automate tasks and to create complex applications.
Large Language Models
Large language models are artificial neural networks used to process and understand natural language. Commonly trained on large datasets, they can be used for a variety of tasks such as text generation, text classification, question answering, and machine translation. Over time, these models have continued to improve, allowing for better accuracy and greater performance on a variety of tasks.
AI Language Learning Software
AI language learning apps use artificial intelligence to help users learn new languages more efficiently by personalizing the learning experience. These apps often offer interactive lessons, voice recognition, and real-time feedback to improve pronunciation, grammar, and vocabulary. The AI algorithms adapt to the user's learning pace, strengths, and weaknesses, providing tailored exercises and challenges.
Small Language Models Software
Small language models are machine learning models designed for natural language processing tasks with a smaller number of parameters compared to large language models. They are often used in scenarios where computational resources or training data are limited, offering a more efficient solution.
Machine Translation Software
Machine translation software is an artificial intelligence (AI) technology that enables computers to automatically translate text from one language to another. It utilizes AI techniques such as natural language processing and statistical algorithms to determine the most accurate translations possible. Machine translation software can provide quick translations of large blocks of text and has become increasingly sophisticated over time. It is used in a variety of contexts, from facilitating international business communications to helping people access information in languages they don't know.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.

16 Products for "language" with 2 filters applied:

  • 1
    Comet Backup

    Comet Backup

    Comet Backup

    Start running backups and restores in less than 15 minutes! Fast, secure backup software for businesses and IT providers. Comet is a flexible, all-in-one backup platform available in 13 languages. You choose your backup destination, server location, configuration and setup. Backup to your own storage/location, SFTP, FTP or cloud storage provider (Wasabi, Amazon AWS, Google Cloud Storage, Microsoft Azure, Backblaze B2, or other S3-compatible cloud providers). Comet’s modern ‘chunking’ technology powers client-side deduplication with no full re-uploads after the first backup. ...
    Leader badge
    Starting Price: $19 per month
    Partner badge
    View Software
    Visit Website
  • 2
    Kiuwan Code Security
    ...Integrating into your CI/CD pipeline, Kiuwan enables early detection and remediation of security issues. Kiuwan supports strict compliance with industry standards including OWASP, CWE, MISRA, NIST, PCI DSS, and CERT, among others. ✅ Large language support: 30+ programming languages. ✅ Detailed action plans: Prioritize remediation with tailored action plans. ✅ Code Security: Seamless Static Application Security Testing (SAST) integration. ✅ Insights: On-demand or continuous scanning Software Composition Analysis (SCA) to help reduce third-party threats. ✅ One-click Software Bill of Materials (SBOM) generation Code Smarter. ...
  • 3
    Abstract Security

    Abstract Security

    Abstract Security

    ...No Noise – Remove unnecessary noise from your data in flight before routing it to your destination No lock-in – With our real-time normalization of data to OCSF format, route to any destination without worrying No Hassle – No need to learn complex query languages with our easy to use ‘no-code-required' model for policy creation. Additionally, let our AI SME help build your policies via natural language requests. No Alert Fatigue – Our AI SME can help summarize insights and prioritize alerts based on MITRE ATT&CK Framework.
  • 4
    SpectX

    SpectX

    SpectX

    ...SpectX easy-to-read pattern matching language can flexibly match any data, no need to read or write regex.
    Starting Price: $79/month
  • 5
    FusionAuth

    FusionAuth

    FusionAuth

    ...Whether you’re building a startup app or managing enterprise-scale infrastructure, FusionAuth delivers all the must-have features — from login and SSO to advanced protocols like OAuth2, OIDC, SAML, and WebAuthn — in a self-hostable or cloud-native package. Designed with developers in mind, FusionAuth integrates seamlessly with any language, framework, or architecture. Every capability is API-first and built for extensibility, so you can tailor authentication workflows without getting locked into rigid, inflexible systems. FusionAuth supports all the key use cases — user registration, multi-factor authentication (MFA), passwordless login, role-based access control, and more — while helping you stay compliant with GDPR, HIPAA, PCI, and other regulatory standards.
    Leader badge
    Starting Price: $0
    Partner badge
  • 6
    Eddie

    Eddie

    Eddie

    Eddie is a high availability clustering tool. It is an open source, 100% software solution written primarily in the functional programming language Erlang (www.erlang.org) and is available for Solaris, Linux and *BSD. At each site, certain servers are designated as Front End Servers. These servers are responsible for controlling and distributing incoming traffic across designated Back End Servers, and tracking the availability of Back End Web Servers within the site. Back End Servers may support a range of Web servers, including Apache. ...
  • 7
    Suricata

    Suricata

    Suricata

    The Suricata engine is capable of real time intrusion detection (IDS), inline intrusion prevention (IPS), network security monitoring (NSM) and offline pcap processing. Suricata inspects the network traffic using a powerful and extensive rules and signature language, and has powerful Lua scripting support for detection of complex threats. With standard input and output formats like YAML and JSON integrations with tools like existing SIEMs, Splunk, Logstash/Elasticsearch, Kibana, and other database become effortless. Suricata’s fast paced community driven development focuses on security, usability and efficiency. ...
  • 8
    Reporter

    Reporter

    Security Reporter

    ...The platform supports security teams and pentesting providers in managing findings, producing professional reports, and delivering consistent results across complex environments. Key capabilities include a centralized content and vulnerability library, customizable report templates, multi-language reporting, and native imports from more than 140 security testing tools. These features support efficient vulnerability management, accurate reporting, and repeatable assessment processes. Security Reporter is offered exclusively as a self-hosted, on-premise solution, ensuring full control over sensitive security data and supporting common compliance and data governance requirements. ...
  • 9
    Polymer

    Polymer

    Polymer Data Security

    Polymer DLP is a comprehensive data governance and remediation platform that integrates with your SaaS applications. We use machine learning and natural language processing to automatically detect and stop sensitive information like PII or business-critical data from going to the wrong people in real time. In addition, we offer real time feedback and training to stop future incidents before they happen. Try for free today and set up a custom policy in minutes. Polymer is constantly expanding, currently we integrate with Slack, Google Drive, Microsoft Teams, One Drive, Bitbucket, Github and Box.
    Starting Price: $4/month/user
  • 10
    SCYTHE

    SCYTHE

    SCYTHE

    ...Organizations know they will be breached and should focus on assessing detective and alerting controls. Campaigns are mapped to the MITRE ATT&CK framework, the industry standard and common language between Cyber Threat Intelligence, Blue Teams, and Red Teams. Adversaries leverage multiple communication channels to communicate with compromised systems in your environment. SCYTHE allows you to test detective and preventive controls for various channels.
  • 11
    ClamAV

    ClamAV

    ClamAV

    ...ClamAV includes a multi-threaded scanner daemon, command-line utilities for on-demand file scanning, and automatic signature updates. ClamAV supports multiple file formats and signature languages, as well as file and archive unpacking. Access to ClamAV versions that work with your operating system. ClamAV® is an open-source antivirus engine for detecting trojans, viruses, malware & other malicious threats. ClamAV® is an open-source (GPL) anti-virus engine used in a variety of situations, including email and web scanning, and endpoint security. ...
  • 12
    BurpGPT

    BurpGPT

    Aegis Cyber Ltd

    ...Burp GPT continuously improves based on user feedback, ensuring it meets evolving security testing needs. Burp GPT is a robust tool developed to enhance the precision and efficiency of application security testing. Extended with advanced language processing capabilities and an intuitive interface, it enhances security testing for both beginners and seasoned testers alike. With BurpGPT, you can perform sophisticated technical tasks.
    Starting Price: $100.07 per year
  • 13
    VictoriaLogs

    VictoriaLogs

    VictoriaMetrics

    ...It seamlessly integrates with widely used log collectors and offers a more straightforward setup process than Elasticsearch and Grafana Loki. The robust LogsQL query language provides full-text search capabilities across all log fields, simplifying log management. It scales impressively with CPU, RAM, disk IO, and space, running efficiently on Raspberry Pi and high-end servers. It handles data volumes up to 30 times larger than Elasticsearch and Grafana Loki on the same hardware, making it a powerful choice for various environments. ...
    Starting Price: $0
  • 14
    Debricked

    Debricked

    Debricked

    ...The service runs on state of the art machine learning, allowing the data quality to be outstanding as well as instantly updated. High precision (over 90% in supported languages) in combination with flawless UX and scalable automation features makes Debricked one of a kind and the way to go for open source management. Recently, debricked released their new platform by the name of Open Source Select where open source projects can be compared, evaluated and monitored to ensure high quality and community health.
    Starting Price: Free
  • 15
    Bitwarden

    Bitwarden

    Bitwarden

    Bitwarden is an open source password management solution that empowers enterprises and individuals to securely store and share sensitive data with end-to-end encryption. Share Encrypted Information - Share your sensitive information safely and securely with individuals, teams, and enterprises. - Transmit encrypted information via a secure link to anyone through your preferred communication channel like text or email. Make Password Management Convenient - Generate and store your...
    Leader badge
    Starting Price: $4 per month
  • 16
    ActiveState

    ActiveState

    ActiveState

    ActiveState provides software development teams with the world's most comprehensive library of secure and trusted open source, over 79 million vetted components across all major language ecosystems (e.g., Java, Javascript, Python, R, Go, etc.), including transitive dependencies and OS-level libraries. By building everything from source, we ensure that every component is what it says it is, contains the fewest amount of vulnerabilities, and is continuously remediated. Companies can consume this open source where and when they need it - through their existing artifact repositories, as container images or managed distributions, or via IDPs. ...
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB