With over 15 years’ experience in the IT field, SysAid serves over 100K admins globally. Our unique help desk/ITSM solution is built to serve all your IT needs. SysAid provides one centralized system for: information, actions, communication, reporting, support, knowledge & more. Our easy to use ticketing system facilitates over 82M tickets a year, supporting over 2000 organizations in the US alone. We’ve been translated to more than 40 languages.Are you an IT pro at a company with 1000+ employees?Advertisement
- Other Operating Systems (5)
- Windows (5)
- Linux (4)
- Modern (4)
- Grouping and Descriptive Categories (3)
- BSD (2)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Software system consisting of two proxies that capture VNC over TCP traffic and converts it to VNC over RTP in order to provide streaming features to VNC.
Servlet container extensions that help web developers write full featured Java web applications.
Our aim is providing fixed nodes with redundancy, share unused bandwidth, and create hotspots with base services(web,email,IM,etc.) for any roaming user. GOAL - To make sharing your excess bandwidth as easy as setting up a NAT (Or XP ICS). Admins Needed!
It's not a matter of it, but when your applications are going to crash. When they do, we will be here to make troubleshooting easier and predictable. Built-in features include 200+ OOTB application and operating monitoring templates, ability to create customized templates for custom applications, dynamic baselining tuned to your environment, and more! Ready to have 60% of your time back? It's yours with Server and Application Monitor.Advertisement
The SecurityStalker(c) & IA Defender(c) projects are scalable, solutions to fighting internet abuse aimed at single user, SOHOs' and corporate network environments. Reacts to both external and internal threats. Extensive reporting. SpamPal aware.
Digivox's system of sound control. This project is exclusive use for Digivox's internal control. Only authorized people can modify, use, etc.