Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Learn More
Desktop and Mobile Device Management Software
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
C/C++ Compiler for the ActionScript VirtualMachine (AVM2)
Previously codenamed "FlasCC" and "Alchemy," CrossBridge provides a complete BSD-like C/C++ development environment based on GCC that lets you compile your C/C++ code to target the Adobe Flash Runtimes (Flash Player and AIR). With CrossBridge you can port almost any existing C/C++ code to the web, across browsers.
Forum:
http://forum.crossbridge.io/
GitHub - SDK Source:
https://github.com/crossbridge-community/crossbridge/
GitHub - Issue...
High-level, meta-language, trans-compiler with virutal machine
XièXiè is a language with a trans-compiler (or rather source-to-source compiler) which compiles to mainly C++ (C++98 and C++11).
It also comes with an own assembler compiler for ARM, IA-32/ x86 and its own byte-code XBC (XièXiè-Byte-Code) including a virtual-machine.
XièXiè can be seen as a "Meta Language".
--- THIS PROJECT IS IN IT'S FIRST STEPS ---
jRate is a real-time Java compiler and runtime system (based on GNU GCJ) with support for much of the Real-Time Specification for Java (RTSJ), including threading constructs with real-time constraints, asynchronous event handling, and memory regions.
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.