Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
- Windows (9)
- Grouping and Descriptive Categories (8)
- Linux (8)
- Mac (5)
- BSD (4)
- Modern (4)
- Android (1)
- Embedded Operating Systems (1)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Translates state machine into a target programming language.100 weekly downloads
This project will add,subtract,divide and multiply numbers.
UniNet IRC Software, IRCd, clients, etc...
You can start backing up your Hyper-V and VMware hosts in a matter of minutes. Then set up a backup schedule and replicate backups offsite for added disaster recovery. You can even granularly restore Files or Exchange Items directly, or instantly boot a VM from backup. Download today and get a chance to WIN a Nintendo Switch!Sponsored Listing
Package of tools designed to facilitate the development of language independent, OS independent web applications.
MsAccess2Tcl/TK convert MsAccess form in Tcl/Tk code. Partial support to mysql.
A useful collection of batch files and scripts for daily purposes (backup, security, system management, etc.) and development
An original bruteforce-based encryption/decryption system. BBE was originally conceived to chat with encrypted text on IRC. mIRC and X-Chat support BBE via script addon. BBE can also encrypt MIME encoded files. Blowfish encryption is currently supported.
OpenRMI defines a messaging interface. This interface is applied in a one to many fashion, using a controller with many nodes. The nodes connect via RMI to the controller and are assigned work via the same interface.
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
ISO 17799 - Code of practice for information security management. Creation of methodology and documentation for audit adapted to ISO. One is made up of an introduction on general aspects of the security of the information.