4 programs for "x-rite" with 2 filters applied:

  • Top-Rated Free CRM Software Icon
    Top-Rated Free CRM Software

    216,000+ customers in over 135 countries grow their businesses with HubSpot

    HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
  • Manage Properties Better For Free Icon
    Manage Properties Better For Free

    For small to mid-sized landlords and property managers

    Innago is a free and easy-to-use property management solution. Whether you have 1 unit or 1000, student housing, or commercial properties, Innago is built for you. Our software is designed to save you time and money, so you can spend more time doing the things that matter most.
  • 1
    i2ctools is a linux-lm_sensors-like utilities contain i2cget.exe and i2cset.exe, but run under OLD MS-DOS environment and written in Assembly(MASM-6.11) Now they work on Intel ICH-x series Chipsets
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Common Hardware Recovery Solutions by Ukrainian-Russian network
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    PCEmu is a software-only PC emulator. It emulates an 8086-based machine with VGA text graphics, EMS memory, host file system access, and `hardware' debugging. It runs DOS and most programs correctly.
    Downloads: 8 This Week
    Last Update:
    See Project
  • 4
    Downloads: 0 This Week
    Last Update:
    See Project
  • The Secure Workspace for Remote Work Icon
    The Secure Workspace for Remote Work

    Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

    Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
  • Previous
  • You're on page 1
  • Next