Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
OSI-Approved Open Source (319)
- GNU General Public License version 2.0 (199)
- BSD License (74)
- GNU General Public License version 3.0 (22)
- Artistic License (13)
- GNU Library or Lesser General Public License version 2.0 (11)
- MIT License (11)
- Artistic License 2.0 (3)
- Academic Free License (2)
- Apache License V2.0 (2)
- Apple Public Source License (2)
- Apache Software License (1)
- Attribution Assurance License (1)
- Computer Associates Trusted Open Source License 1.1 (1)
- Eclipse Public License (1)
- Educational Community License, Version 2.0 (1)
- Other License (6)
- Public Domain (5)
- Modern (332)
- BSD (318)
- Linux (306)
- Mac (230)
Grouping and Descriptive Categories (220)
- All POSIX (205)
- All BSD Platforms (189)
- All 32-bit MS Windows (47)
- OS Independent (27)
- 32-bit MS Windows (22)
- 32-bit MS Windows (17)
- 64-bit MS Windows (12)
- OS Portable (12)
- Classic 8-bit Operating Systems (1)
- Project is OS Distribution-Specific (1)
- Project is an Operating System Distribution (1)
- Project is an Operating System Kernel (1)
- Windows (103)
- Solaris (89)
- Other Operating Systems (56)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Monitors the charge/discharge state of the battery in a Linux/GNU laptop, warns user of low charge, shuts down computer before it crashes because of an exhausted battery.
access network control scripts
Report creation tool. Presents results of an SQL query as a series of template-based entries.
With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
This package will allow people to check, change, update the license of their projects. It will conform to all new licenses available.
A set of tools, many written in C, to deal with BRO (www.bro.ids.org). and its working environment.2 weekly downloads
Cистема контроля за нагрузкой создаваемой пользователями. В первую очередь предназначена для веб-хостинга.
A UK-based organisation developing Open Source solutions for deployment in the educational sector. Such solutions including an Active Directory/RM Community Connect alternative, website and mail, office software, etc.
Simple backup script for DVDRAM media written in Perl.1 weekly downloads
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
Command Line Instruction Framework (CLIF) is a framework which creates a learning shell environment (CLIF shell) to facilitate GNU/Linux command line proficiency.
Consultant Vendor Management software is an invoice based system written with consulting companies in mind to enter timesheets, generate invoices, track payments, commissions, payroll and expenses from one single location.
CEHALET (Common Ethical Hacker's Toolkit) is a collection of open source tools used for ethical hacking or pen-test.
dhcpd.conf generator1 weekly downloads
Monitor your network services and displays a DEFCon level
Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Sponsored Listing
A/C Controller is FreeBSD based appliance which monitors environmental temperature and automatically power on/off Air Conditioning units to achieve required temperature. It's distributed as 2GB (204MB zip) pre-installed FreeBSD image.
Sql2xml is a perl cgi program that will help user or developer to request sql database query and convert to json, csv, xml or ini format through a web server. A single sql2xml support request from multiple user and multiple database1 weekly downloads
Monitorix is a system monitoring tool
This program runs in terminal. It generates powerful passwords without saving them in your machine.
Bioinformatic tool to improve draft genome assemblies by closing gaps4 weekly downloads
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
A HMM-based algorithm for defining enriched regions from ChIP-seq data2 weekly downloads
Web-based POS for LedgerSMB
Read, write and edit metadata525 weekly downloads
Web-based subversion manager1 weekly downloads
run a command with a time limit
Shoki is a free, open source network intrusion detection system. The fundamental design goals are simplicity and modularity, and the focus is on traffic analysis rather than content inspection.
An anti spam system that predates built-in options in Exim, since Exim now has it's own options you should not consider using this code.