Showing 9 open source projects for "mac mud"

View related business solutions
  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • Omnichannel contact center platform for enterprises. Icon
    Omnichannel contact center platform for enterprises.

    For Call centers or BPOs with a very high volume of calls

    Deliver a personalized customer experience with every interaction, across every channel, with uContact, net2phone’s cloud contact center solution.
  • 1
    Part authoring tool, part electronic environment, BrightMOO is designed to demonstrate the feasibility of building client-side, three-dimensional interactive environments using existing MOO technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Russified UDB(Unified Database). Русифицированная ОБД(Объединенная База данных). Россия, народ, объединяйтесь!
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    ele (enCore Learning Environment) is a moo- and web-based environment (server, db, GUI) designed for educational purposes. It aids and promotes online learning and community building through open standards and ease of use. http://encore-consortium.org/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Dragonsong is a new-age MUD Client written in C#. Eventually its feature set will match that of ZMUDs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Gain insights and build data-powered applications Icon
    Gain insights and build data-powered applications

    Your unified business intelligence platform. Self-service. Governed. Embedded.

    Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
  • 5
    JaMOOka is an applet-based MOO client. Designed for JHCore MOOs, it uses Amy Bruckman's MacMOOse utilities and the MCP 2.1 protocol to facilitate a number of advanced MOO editing and programming tasks through client windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Multi-User Domain. Scheme as implementation language as well as for coding object behaviour. Scheme/MUD enthusiasts welcome.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Atomatrix is a multithreaded execution system of atomic matrices with a dynamic compiler and a network eviron. It is the next generation object-orientated environment. XML, MUD-OO CLI, GnucDNA support, windows and many subprojects are built-in.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 8
    CODENAME: Monkey-Bots is an educational and entertaining multiplayer game for the GameBoy Advance.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    The VP7 WKP is a GTK program which simulates the decay of radioactive nuclei. The user can do decay/activity measurements on various pre- or user defined materials. It is also possible to study the effectivity of aluminium, paper and lead as shields. This
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • Previous
  • You're on page 1
  • Next