Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.
Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
Build an app in Retool
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
Transparent multi-level statistically controlled compression network layer for Java applications. Works with Java 1.2 and does not require application recompiling.
Jipsy is a drop-in replacement for java networking code to enable the use of IPv6 in a Java application. The use of this software requires no modifcation to your code or even recompilation of java code. The only change that is required is to add the jipsy
This Project aims to provide a fully portable Java based RTFM network meter and Network monitoring/management system
It uses pcap which is simplify using jpcap library ( JAVA PCAP binding )
OpenQueue is an open protocol for publish-and-subscribe message queuing. This enables language-independent, loosely-coupled, asynchronous communications between applications on platforms supporting TCP. Similar to MQSeries or MSMQ, but open.
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
A distributed internet super computer. Inspired by the likes of Seti@Home & distribted.net, but open source and introducing a market place concept for tasks
LdapEngine, which includes an easy, more natural way to search and manipulate a LDAP tree (especially compared to JNDI). The second part is a graphical LD
JavaShout is a mp3 shouter for use with a shoutcast server (http://www.shoutcast.com, http://www.icecast.org) with remote administration features, second source, XML dump, etc.
It's a modern take on desktop management that can be scaled as per organizational needs.
Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
Service Availability Tester is an application that can be used to test whether a particular service is available. The application can be directed to take an action dependent on the availability of the tested service.
Remote Web Logger is a remote web transaction logging daemon. It operates by passive monitoring of web server traffic to translate web session data to transaction log entries that are written to standard log services such as syslog.
It intends to address situations of indoor short‑range distances in which there are 2 types of entities: terrestrial radars and tiny flying UAVs ("nano drones").
SipSpy is a distributed monitoring tool for SIP networks. SpyAgents run on each of the nodes to be monitored, and a SipSpy connects to each of these nodes, receiving information and displaying it in real-time for all the SIP packets monitored.
SimpleLogViewer is Java 2 based GUI application that display logging data. Can read a file or listen over a TCP socket. Use plugins/embedded scripts to Hide, Rewrite, Colorize lines of log.
The Traffic Control Configurator is a Java tool for configure the Linux tc. You can configure it in Graficalmode or with Terminal in Textualmode. The configuration can export to well structured ShellScript or as xml File.
Maximize number of requests handled in a IT Data Center by minimizing the Power Consumption for IT Data Center and ensuring the Power Consumption of IT Data Center is within the predefined threshold Limits of both Server and IT Data Center.