With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
OSI-Approved Open Source (12)
- GNU General Public License version 2.0 (7)
- Apache License V2.0 (2)
- GNU Library or Lesser General Public License version 2.0 (2)
- GNU Library or Lesser General Public License version 3.0 (2)
- Eclipse Public License (1)
- Fair License (1)
- IBM Public License (1)
- Microsoft Public License (1)
- Mozilla Public License 1.0 (1)
- Sun Industry Standards Source License (1)
- Public Domain (2)
- Other License (1)
- Other Operating Systems (15)
- Linux (13)
- Windows (12)
- Modern (10)
- Mac (9)
- Grouping and Descriptive Categories (6)
- Android (4)
- BSD (4)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Search words in text files, display matching lines in tabs. Options to save results, exclude words, display the line numbers. Tiny file for searching big text files. Please leave feedback to help improve the application. Documentation coming soon.7 weekly downloads
Symja - Java Computer Algebra System4 weekly downloads
Reduced SWING coding. New UI components. Easy layout management.3 weekly downloads
Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
This project is just the bridge between MSMQ and JMS (JAVA). Based on JNI concept which helps to create a DLL by using Visual C++. The java methods calls the C++ class which is used to make dll and this C++ class return back messages of MSMQ.1 weekly downloads
A tool based on the model proposed by Bellman & Zadeh (1970) fuzzy logic (fuzzy sets) decision support paper. The first version of the application was developed in Java (pure java + jgoodies and some other APIs). Now it is being rewritten using nebular, a pure Java fuzzy API.1 weekly downloads
Web-Based Academic course system for assigning students to courses written in JAVA with pgsql DB and evolutionary algorithm for assigning students to course requests. Multiple roles for users: Admin, Student, Teacher or Tutor. International localization.1 weekly downloads
Burn your Neighbour is an administration site for this card game whihc uses EJB 3.0 and JSF(with AJAX) capabilities. It is aimed to provide a sample of how to use these Java based technologies.
This is a brand new gaming community which hopes to grow big really soon. We are currently running a MU Online Private server.
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
This is an open source from Java platform.
[WARNING! PROJECT IS NOT READY TO USE. DO NOT DOWNLOAD FILES FROM FILES REPOSITORIES!] ModernCMS - a powerful php engine that can up your website. You can create your own portal, forum, blog, website, company website, multimedia portal and other! Visit site http://modern-cms.sourceforge.net/ for more information!
Microstream is a open platform with open architecture and open functionality to build up information systems .
SeSAm (Shell for Simulated Agent Systems) provides a generic environment for modelling and experimenting with agent-based simulation with a special focus on the easy construction of complex models including dynamic interdependencies or emergent behaviour
This project will be used for the identification of the thumb impression. We will be having a image of thumb in our database and will use another image for matching purpose. We can also match the images which are not in the data base.
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
analysis tool enables user to run differential expression on clusters