Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.
SKUDONET ADC, operates at the application layer, efficiently distributing network load and application load across multiple servers. This not only enhances the performance of your application but also ensures that your web servers can handle more traffic seamlessly.
chainssh is a shell script to smplify the ssh login via multiple sshgateways/firewallgateaways. e.g. connect from homehost via sshgateway to a clusternode with one command.
Pythia is an open source highly scalable standards-based cache for Java. Pythia provides, lightning-fast speed, fail-safe operations, persistence, transactionality, dynamic scaling, out of Heap caching, extreme ease of use
Create IT quote templates, automate workflows, add integrations & price catalogs to save time & reduce errors on manual data entry & updates.
ConnectWise CPQ, formerly ConnectWise Sell, is a professional quote and proposal automation software for IT solution providers. ConnectWise CPQ offers a wide range of tools that enables IT solution providers to save time, quote more, and win big. Top features include professional quote or proposal templates, product catalog and sourcing, workflow automation, sales reporting, and integrations with best-in-breed solutions like Cisco, Dell, HP, and Salesforce.
Scarlet is an extension for Atlassian JIRA, the leading Enterprise issue tracking and management software, allowing easy clustering of JIRA application instances, ensuring both high availability and linear scalability.
TripleF is a middleware for a Distributed File System, developed totally in Java. It allows highly availability, reliability and scalability to the system, through the data replication, resulting in system's highly fault tolerance.
This is an opensource project for the calculation of the mathematical constant Pi. If you are a mathematician or programer please contribute ideas or code for this project. Non professionals are also welcome to contribute.
Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
Alternative implementation of Spring framework remoting subsystem that supports different schemes of remote communication between client and server (1-1, 1-many, dynamic services discovering).
NOD-MP stands for not another data-mining project. It is educational and scientific software to utilize data mining clustering algorithms through a user-friendly interface.
Project name: frecl (free remote control). This project is devoted to a problem of remote controlling PC. (For an example: management of several IR-remote controls of the several computers incorporated into a network, using one or more IR-receivers.).
A light weigth high performance cluster server to link several Java machines into one logical unit. Medusa does not compete with J2EE servers but allows clustering of standard Java code for fail-over, redundancy and processing power.
WritTorrent - Rewriting BitTorrent distribution by providing a way to manage swarm topology using RSS. We're in the initial stages of providing basic utilities for the most flexible handling of .torrent files through xml syndication technologies.
Zeus Grid is a Grid Computing environment usefull to run systems in heterogenous machines at same time. In this first step, it will only compile, run and collect application results and file storage.
JVMCluster
Features:
- clusterable Java Virtual Machine (based on PVM)
- uses CPPVM as adapter layer to PVM
- object persistent layer integrated into JVM
- memory management unit is based on integrated relational database
- JDBC/ODBC api to acces
The aim of the OpenGrid project is to enable personal high-performance grid computations. More specific, issues of configuration, deployment, controlling and monitoring of embarrassingly parallel computations are addressed.
The purpose of this program is to prove that given a finite number of Monkeys and a finite amount of time one monkey will be able to make more money off the stock market than any human being. Checkout our web site for an uncorrupted download.
The iChilli mobile J2EE platform provides a J2EE compliant runtime environment for both server and mobile platforms, such as J2ME, MIDP or other CLDC based devices. For example iChilli runs on the PersonalJava enabled Sharp Zaurus and Compaq's iPAQ.
java-based complete Agent (Artificial Intelligence) Framework with all the features you might expect in an Agent Framework: Mobility, Autonomy, Distributed communication, Agents can be written in Java, Jython, or Beanshell.
Thanks to carefully thought out architecture an emulator for all hardware (i386 i860 sparc hppa SGI Mips Alpha etc) on any hardware. A lot of new theories have gone into this trying to fix old problems.
Utilize Java to create an application capable of massivly parallel operations. Application will be targeted as a Napster Clone, with the additional capability of downloading projects which are seeking computer time.
Provide a common portal platform to join Internet Service Providers users into a community, both including personalization using "portlets" as the building blocks of .NET type applications and using a Parallel Portal Engine to overcome such demanding use
General purpose, cross-platform, high-latency, high availability (HA) daemon. HA is achieved by IP-takeover of the virtual/HA server(s) by one or more real/redundant servers. Requires Perl 5. Designed for ease of deployment (for a HA system :-).