Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
Try Retool free
Outgrown Windows Task Scheduler?
Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.
Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
Fine-grained authorizations and single sign-on for SSH remote commands
Mesh is a secure, lightweight grid middleware that is based on the addition of a single sign-on capability to the built-in public key authentication mechanism of SSH using system call interposition.
Fast reliable local/remote file transfers, sync, tar create/extract
...These include end-to-end integrity via cryptographic hashes, throttling of transfers to prevent resource exhaustion, balancing transfers across resources based on load and availability, and parallelization of transfers across multiple source and destination hosts for increased redundancy and performance.
Transparent Local and Remote Parallelization for Java
Mpaxs provides a simple abstraction for executing Callables and Runnables either locally within the same Virtual Machine, on the same host via RMI, or on remote machines, also via RMI. It supports launching of new compute hosts via an extensible API, currently featuring local compute host launching and grid compute host launching using the DRMAA API.
...The goal is to handle high availability by storing copy of the same file on several nodes.
HADOS provides RESTFUL APIs to easily store, check or retrieve files. Using the powerful cluster APIs you can retrieve the files whatever the node that hosts it.
To avoid any single point of failure, it is possible to apply a request to any node of the cluster, there is no master node.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
A Nagios check that ensures the same service on multiple hosts - in a lazy cluster - can be "verified" if the service must remain active on one host at a time.
The program `pexec` executes parallely the given command or shell script on the local host or on remote hosts, while some of the execution parameters, namely the redirected standard input, output or error and environmental variables can be varied.
Semys consists of a library for group communication and an architecture to build a sequential consistent system. A sequential consistent process can run on several physical hosts and is not disturbed by the downtime (crash) of a host.
central-ssh (cssh) is a Perl program that allows systems administrators to run multiple arbitrary commands on multiple arbitrary hosts from one central host. Straight CLI or config file can be used.
JunitTCG will be a TestCaseGenerator for the use with JUnit. It will implement WebServices which use the globus toolkit (www.globus.org) to distribute Unit Testcases to a grid of execution hosts.
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
N-stage worm propagated via SSH. It executes commands in a given list of hosts and copies files to them with rsync. The paths for its propagation to the cluster are configurable. It offers a scalable/reliable transport API thanks to its adaptive algorithm
UnixODBC.pm provides a Perl API for the unixODBC driver manager and a bridge API for unixODBC network queries. The sample text-mode, GUI, and Web clients can manage multiple hosts and DBMSs and create RSS output.
[Now hosted on Github.] A shell written in Ruby that makes it easier to work with clusters of *nix hosts. The shell allows you define groups of servers and commands that can be executed on the servers. As of right now, all communication is performed
Software for reliable url cloaking system using low q.o.s hosts and lines such as home PC's and dsl or cable connections.
CDUCK combined DNS-server and webserver functionality and strict security for the creation of reliable domain web cloaking.
mxtraf is a network traffic generator.
With mxtraf, a small number of hosts can be used to saturate a network with a tunable mix of TCP and UDP traffic. The primary purpose of mxtraf is to allow stress testing of experimental network protocols. m
Peekabooty is a peer-to-peer application which can route web page requests around firewalls. This is done by asking hosts in the network that are not censored to fetch censored web pages.