ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
OSI-Approved Open Source (631)
- GNU General Public License version 2.0 (116)
- GNU Library or Lesser General Public License version 2.0 (38)
- BSD License (20)
- MIT License (14)
- Apache License V2.0 (11)
- Common Development and Distribution License (10)
- Open Software License 3.0 (9)
- GNU General Public License version 3.0 (8)
- Common Public License 1.0 (7)
- Educational Community License, Version 2.0 (5)
- Qt Public License (5)
- Adaptive Public License (4)
- Computer Associates Trusted Open Source License 1.1 (4)
- Mozilla Public License 1.0 (4)
- Affero GNU Public License (3)
- Public Domain (31)
- Other License (6)
- Windows (521)
- Linux (404)
Grouping and Descriptive Categories (298)
- All 32-bit MS Windows (120)
- 32-bit MS Windows (90)
- All POSIX (88)
- OS Portable (41)
- OS Independent (19)
- 32-bit MS Windows (16)
- All BSD Platforms (16)
- 64-bit MS Windows (13)
- Project is an Operating System Kernel (8)
- Project is an Operating System Distribution (7)
- Project is OS Distribution-Specific (1)
- Mac (243)
- Modern (229)
- Android (190)
- BSD (95)
- Other Operating Systems (40)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
SolidGraph CAD system
Software Lab. for Image Analysis
The ClusterMX program implements various clustering algorithms1 weekly downloads
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
Simple simulator for wireless sensor networks. C++ and QT.
Toolkit for various aspects of AI
Obstacle Avoidance in Player/Stage using the ProBT library.
Collaborative filtering geared toward the Netflix Prize. A collection of popular algorithms optimized for speed, on windows, using 64-bit SSE assembly language complete with an embedded Python Interpreter.
SmokeTorrent enhances the original bittorrent concept by providing distributed peer to peer sharing, public/private key encryption of all data shared on the network, automatic parity block generation for torrent data, and a web-of-trust sharing scheme.
Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Sponsored Listing
A Video Messaging project where users can login, check their video mail and reply by recording their own messages. Users can also select from various different quartz effects to apply to the recording.
First person multiplayer maze 3D game based on OpenGL.
A Monopoly like turn-board game.
-- PEM - A tool like a visual debugger with a rich user interface(but there is much more to this than a debugger), it is better described using the example of Eclipse debugger. This tool inverts the debugger to develop code.
create a forms used in exploring, copy and moving proceses
Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
Ce projet se décompose en 3 parties : La première partie consiste à simuler l’antenne du Lecteur RFID. La deuxième partie à réaliser est la partie modulation ou l’oscillation. La troisième partie est la partie contrôleur du système RFID
It's a new GNU/Linux distribution, based on Linux From Scratch, with focus on easy complete and non-redundand system administration made with a simple textual command-line interface and in the interoperability with Windows (Further with other OS).
A system for keeping your bibliography, notes and comments together.
IDE for Assembler language. Provides tools for education and many other features.
Chat application using a World of warcraft like interface
With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
Speech and Language Translation Decoder
The count of vehicles is a key task in traffic gauging, as it provides information for designing new roads. This software presents an algorithm to detect and track vehicles in real time or from a video file.13 weekly downloads
A combination RTS RPG game where a RTS player can build basic units, but also hire "Hero" units which are other players online who will play the game as a FPS/RPG game
Direct C++ to C# translator, translates one of the languages to another without compiling. Has academic aim only!!!27 weekly downloads
This project have a goal of development an enviroment to model and simulate an formal method named Petri Net. This tool must be build to help student undergraduate in a college course.
Fast Model Based Variant Filtering Tool
SuperWikia: The Runtime/Realtime Environment for Codesmiths