You can start backing up your Hyper-V and VMware hosts in a matter of minutes. Then set up a backup schedule and replicate backups offsite for added disaster recovery. You can even granularly restore Files or Exchange Items directly, or instantly boot a VM from backup. Download today and get a chance to WIN a Nintendo Switch!Sponsored Listing
OSI-Approved Open Source (212)
- GNU General Public License version 2.0 (31)
- BSD License (8)
- GNU Library or Lesser General Public License version 2.0 (8)
- GNU General Public License version 3.0 (7)
- MIT License (5)
- Open Software License 3.0 (4)
- Computer Associates Trusted Open Source License 1.1 (3)
- Adaptive Public License (2)
- Apache License V2.0 (2)
- Artistic License (2)
- Common Development and Distribution License (2)
- Common Public License 1.0 (2)
- Educational Community License, Version 2.0 (2)
- NASA Open Source Agreement (2)
- Affero GNU Public License (1)
- Public Domain (6)
- Linux (163)
- Windows (158)
- Mac (101)
Grouping and Descriptive Categories (100)
- All POSIX (34)
- All 32-bit MS Windows (29)
- OS Independent (24)
- OS Portable (23)
- 32-bit MS Windows (16)
- All BSD Platforms (12)
- 64-bit MS Windows (5)
- Project is an Operating System Distribution (5)
- Project is OS Distribution-Specific (3)
- Project is an Operating System Kernel (3)
- Classic 8-bit Operating Systems (2)
- 32-bit MS Windows (1)
- Modern (87)
- Android (62)
- BSD (37)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
This project is only a testproject to learn SVN
This is a project containing a simple Unix Shell using the C Programming Language that will have features such as an implementation of command line history and more.
Bioinformatics Perl extension for the analysis of antibody variable domain repertoires. Suitable for mammalian repertoire sequences obtained either by Sanger or 454 sequencing. Methods published in Glanville, Zhai, Berka et al, PNAS 2009.
The myriad of functionality that comes with Snare, from Verbose Truncation to Output Driven Filtering have been helping companies around the world zero in on threats in record time while spending less on their SIEM. This is made possible by reducing the noise in your log collection while delivering the critical data for both forensics and analytics, dependably. Snare just works. Try our agents free today!Sponsored Listing
Vak'a Nüvîs is a event detection research project. This project is maintained by a senior project team from Bilkent University.
XD-shell - is a shell (console) interface to XD program which deals with experimental electron density refinement.
Zonnon Compiler for java is an implementation of the grammar of zonnon for java. There are different versions developed with javacc, sablecc, gold parser .... GUI and Report tools too
Proyecto de Fin de Carrera
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
balaBLAST is a free useful tool for the parallel execution of NCBI BLAST. It exploits I/O parallelism and database partitioning, while guaranteeing the same output reporting of a single-core NBCI BLAST. Really easy to install, with package Debian.
add a menu easily in console application
This Project is for and by a group of six students looking to build a patient Monitoring system in java/cpp. Code base can be used for basic server client sytems in the future.
Customize Kernel 64-Bit Operating System
A general-level Prolog implementation of the DALMAS architecture.
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
its all about developing a software router in fedora.................
fingerprint matcher based upon image correlation
System to allow Information Retrieval of a Corpus.
Another point of view to Artificial Neuronal Networks
Search engine to help in user understanding of the concepts behind indexing, parsing, clustering, relevance feedback and ranking.
With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
Simulating Cache based Checkpointing and Rollback schemes are currently performed only at the hardware level for the lack of such simulation software that is generic. NCkptSimulator, a simulation tool, will support different checkpointing schemes
nanosleep utility for linux
An adaptive neural network and evolutionary algorithms approach to the machine learning tasks, based on the modular graph grammars. Tested on the "two spirals problem" and other tasks. Implemented in Matlab and C++.
C++ programs and classes for image-processing related to single-particle electron microscopy
The project is a translator which translates numbers and math operations into numerals(words) in polish language. The programming language is C.
avr atmega128 microcontroller
Implementation of IEEE 802.15.4 in nesC for TinyOS and Crossbow Micaz and TELOSb motes. Available as www.open-zb.net