Showing 4 open source projects for "cache proxy java"

View related business solutions
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
  • Employee monitoring software with screenshots Icon
    Employee monitoring software with screenshots

    Clear visibility and insights into how employees work. Even remotely.

    Stay productive working at any distance from anywhere with Monitask.
  • 1
    Fen2Pdf

    Fen2Pdf

    Tool for chess teachers to create PDF files with chess diagrams in it

    Tool for chess teachers to create PDF files with chess diagrams in it. 1) Create a pgn file with chess diagrams (FEN notation) in it (e.g by using lichess) 2) Open the Fen2Pdf and select the folder containin the pgn(s) 3) Click start. Fen2Pdf detects the pgn files in it and creates a pdf file You can now print this file and hand the exercises over to your students
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    JPACS, Java Processor and Cache Simulator, was developed to give a simple and clear tool to simulate a processor with a complete associative memory cache at ISA level, using direct memory access or using a program written in assembly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Simulating Cache based Checkpointing and Rollback schemes are currently performed only at the hardware level for the lack of such simulation software that is generic. NCkptSimulator, a simulation tool, will support different checkpointing schemes
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Enables a user to view & alter all aspects of comunications with a web site via a proxy. Primarily used for security based penetration testing of web sites, it can also be used for debugging during development. Seen as part of a hacker toolkit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Tigerpaw One | Business Automation Software for SMBs Icon
    Tigerpaw One | Business Automation Software for SMBs

    Fed up with not having the time, money and resources to grow your business?

    The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
  • Previous
  • You're on page 1
  • Next