The Scality RING is software that turns any standard x86 servers into web-scale storage. With the RING, you can store any amount of data, of any type, with incredible efficiency and 100% reliability, guaranteed—all while reducing costs by as much as 90% over legacy systems.Sponsored Listing
OSI-Approved Open Source (35)
- GNU General Public License version 2.0 (17)
- BSD License (5)
- Apache License V2.0 (4)
- Artistic License (2)
- GNU General Public License version 3.0 (2)
- Mozilla Public License 1.1 (2)
- Academic Free License (1)
- Apache Software License (1)
- GNU Library or Lesser General Public License version 2.0 (1)
- GNU Library or Lesser General Public License version 3.0 (1)
- PHP License (1)
- Other License (3)
- Creative Commons Attribution License (1)
- BSD (38)
- Modern (38)
- Linux (35)
- Mac (24)
- Windows (24)
- Grouping and Descriptive Categories (22)
- Solaris (12)
- OS: FreeBSD ×
JApprDB is a database engine able to store knowledge by means of semantic networks, representing semantic relations between the concepts. Databases are supposed to be queried by Lojban - a syntactically unambiguous language based on predicate logic.
HDB Project is a new formed database development team & community for Ascent Emulator. HDB project is first of all, an organized project.
PicoStorage, a lightweight "filesystem in a file" (Structure Storage) library, features efficient and compact storage of both tiny and large files and directories, compression, and transactions. It is highly scalable, simple and easy to use.1 weekly downloads
With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
iMeMex is a dataspace management system. iMeMex is a research prototype. The package also provides several useful components for research such as external sorting, B+-trees, inverted indexes, content converters, query operators, and graph indexes.
This was a terrible idea and is equally terribly implemented.2 weekly downloads
Speed tables is a high-performance memory-resident database. The speed table compiler reads a table definition and generates a set of C access routines to create, manipulate and search tables containing millions of rows. Currently oriented towards Tcl.
Stellar is an RDBMS server.
A library to PostgreSQL can execute operating system commands from a stored proc and that send e-mail from a stored proc.
Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
Omseek has been renamed to Xapian. Xapian is a Search Engine Library, written in C++ with bindings for Perl, Python, PHP, Java, Tcl, C# and Ruby. It allows you to easily add advanced indexing and search facilities to your applications. See xapian.org
PlutoStatus is a system to publish the current status of your systems. It includes mirroring.3 weekly downloads
RDFStore is a C/Perl library to parse, store and manage RDF.
Sprawler is the first Open Source internet search engine software and service - built by the community, for the community. It will address the various reasons most search engines today still are far from being where they need to be.
JCA compliant connectors for the Berkeley Database system.2 weekly downloads
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing