Showing 9 open source projects for "black arch linux"

View related business solutions
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • An All-in-One EMR Exclusively for Therapy and Rehab. Icon
    An All-in-One EMR Exclusively for Therapy and Rehab.

    Electronic Medical Records Software

    Managing your therapy and rehab practice is a time-consuming process. You spend hours on paperwork, billing, scheduling, and more. Raintree’s Therapy & Rehab EHR is here to help you manage your practice more efficiently. With our all-in-one solution, you’ll get the tools you need to streamline your therapy and rehab practice, improve patient care, and get back to doing what you love.
  • 1
    The Black Toolkit

    The Black Toolkit

    RAD Tool and IDE for PHP, JSP, ASP, C++ and Java Swing

    The interface supports drag and drop HTML components, javascript and scriptlet events, and generate a very fast code, with no additional softwares layers or libraries. You can put your libraries, like jQuery. The generated code works with all browsers. You can create and debug Applets or Java Swing applications easily with the Visual Editor of the tool. Build C++ applications.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2

    PHP mini vulnerability suite

    Multiple server/webapp vulnerability scanner

    github: https://github.com/samedog/phpmvs
    Leader badge
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    go-clean-arch

    go-clean-arch

    Golang clean architecture based on Reading Uncle Bob's Clean Arch

    Independent of Frameworks. The architecture does not depend on the existence of some library of feature-laden software. This allows you to use such frameworks as tools, rather than having to cram your system into their limited constraints. Testable. The business rules can be tested without the UI, Database, Web Server, or any other external element. Independent of UI. The UI can change easily, without changing the rest of the system. A Web UI could be replaced with a console UI, for example,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Bolt

    Bolt

    An embedded key/value database for Go

    ... and randomized black box testing are used to ensure database consistency and thread safety. Bolt is currently used in high-load production environments serving databases as large as 1TB. Many companies such as Shopify and Heroku use Bolt-backed services every day. Please note that Bolt obtains a file lock on the data file so multiple processes cannot open the same database at the same time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Claims Processing solution for healthcare practitioners. Icon
    Claims Processing solution for healthcare practitioners.

    Very easy to use for medical, dental and therapy offices.

    Speedy Claims became the top CMS-1500 Software by providing the best customer service imaginable to our thousands of clients all over America. Medical billing isn't the kind of thing most people get excited about - it is just a tedious task you have to do. But while it will never be a fun task, it doesn't have to be as difficult or time consumimg as it is now. With Speedy Claims CMS-1500 software you can get the job done quickly and easily, allowing you to focus on the things you love about your job, like helping patients. With a simple interface, powerful features to eliminate repetitive work, and unrivaled customer support, it's simply the best HCFA 1500 software available on the market. A powerful built-in error checking helps ensure your HCFA 1500 form is complete and correctly filled out, preventing CMS-1500 claims from being denied.
  • 5
    Black Box Database(BBD) design constrains schema references to the database. The BBD exposes an Application Programming Interface (API) generated by the developer, housed in the database. This API makes the database unit testable as a stand alone module.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Get/Put java VO & XML from SQL stmts in 1 line; No config mapping; Plugin-Arch support; Hibernate and ibatis benchmarked. Lightweight(24KB); Self healing pool; Code Generation for CRUD. Embedded Solr Search. More @ http://onelinejdbc.wiki.sourceforge.net
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    This is a GPL variant project of the BIE product. The Business Integration Engine (BIE) is a full-featured EAI server which allows companies to integrate disparate systems, create and manage agile business processes, and easily service oriented arch...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    A Java-based project for reading and writing on Xbase -- DBF (dBase III / Clipper) file. This project is an implementation of JavaDBF: http://sarovar.org/projects/javadbf/ Credits (JavaDBF): Anil Kumar K. Abraham K. Jacob
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A robust, easy to use Object-Relational Persistence Layer Framework for java projects. The purpose of which is to remove as much hand coded JDBC SQL for all the basic CRUD functions. This includes automatic handling of polymorphic objects, associations, t
    Downloads: 1 This Week
    Last Update:
    See Project
  • Intelligent network automation for businesses and organizations Icon
    Intelligent network automation for businesses and organizations

    Network automation for the hybrid multi-cloud era

    BackBox seamlessly integrates with network monitoring and NetOps platforms and automates configuration backups, restores, and change detection. BackBox also provides before and after config diffs for change management, and automated remediation of discovered network security issues.
  • Previous
  • You're on page 1
  • Next