Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
Build an app in Retool
Find Hidden Risks in Windows Task Scheduler
Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Penrose is a java-based virtual directory server. Virtual directory makes data from LDAP directories, databases and/or applications available to client through LDAP protocol. For a demo, please check out http://penrose.safehaus.org
The collaborative framework Conzilla has primarily been developed to enhance the concept browser Conzilla (http://www.conzilla.org) with collaboration facilities. The Collaborilla framework is generic and can be used by other projects as well.
Mistral-IdM is a project whose aim is to provide an identity management system, with advanced authentication and authorization abilities, based on standards (SAML, XACML, XKMS), providing a user-friendly administration console.
The project aims at developing J2EE Connector Architecture 1.0 Compilant Resource Adapters for integrating various EIS's like XML files, XML DB, LDAP, FTP, SMTP, POP3, Point Of Sale, Properties File, Office Documents
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.