Full access to Enterprise features. No credit card required.
What if You Could Automate 90% of Your Repetitive Tasks in Under 30 Days? At ServoDesk, we help businesses like yours automate operations with AI, allowing you to cut service times in half and increase productivity by 25% - without hiring more staff.
Try ServoDesk for free
Free and Open Source HR Software
OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.
Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
Intent is to develop a kernel module and print driver for the Lexmark X85 All-in-One colour scanner/printer/copier. This kit hopefully will be generic enough to support most/all AIO devices from Lexmark or be easily adapted to do so.
MapFS is a kernel module for Linux that implements a filesystem for composing portions of additional filesystems (read/only or read/write) into a single writable virtual filesystem.
Never miss a sale. Square payment processing serves customers better with tools and integrations that make work more efficient.
Accept payments at your counter or on the go. It’s easy to get started. Try the Square POS app on your phone or pick from a range of hardworking hardware.
An open source project to hold cglinux test suites, which are mostly for CGL2.0 projects (some are already in each individual open source project). This is a centralized place for users to download, while, not for CGL certification or registration.
Trustees is a recursive ACL scheme for the Linux 2.6 kernel's Linux Security Module(LSM) framework. If you have ever used netware, you will be familiar with the speed and convenience of the trustees' approach to ACLs.
LOMAC LSM is a Linux Security Module (LSM) based on the original LOMAC http://opensource.nailabs.com/lomac . LOMAC implements a simple form of Mandatory Access Control mechanism based on Bibas Low Water-Mark Access Control model.
The aim of this project is to develop a modular operating system for the i386 architecture, where each device driver, file system, etc, will be a module that can be loaded and unloaded at run-time from the system.
...It takes out the binary instruction and data from Windows driver (*.sys files), and then combine them with some supporting code to build a corresponding Linux driver module.
A first-of-its-kind homeownership solution that puts YOU at the center of the coveted lifetime consumer relationship.
BoldTrail, the #1 rated real estate platform, is built to power your entire brokerage with next-generation technology your agents will use and love. Showcase your unique brand with customizable websites for your company, offices, and every agent. Maximize lead capture with a modern, portal-like consumer search experience and intelligent behavior tracking. Hyper-local area pages, home valuation pages and options for rich lifestyle data keep customers searching with your brokerage as the local experts. The most robust lead gen tools on the market help your brokerage, teams & agents effectively drive new business - no matter their budget. Empower your agents to generate free leads instantly with our simple to use landing pages & IDX squeeze pages. Drive more leads with higher quality and lower cost through in-house tools built within the platform. Diversify lead sources with our automated social media posting, integrated Google and Facebook advertising, custom text codes and more.
A Linux 2.6 kernel module for the Datagram Control and Congestion Protocol (DCCP). DCCP intends to provide a datagram service with TCP-like or TCP-friendly rate control.
Cryproc is module for the Linux kernel 2.6 which allows user space programs to access the kernel's CryptoAPI functions via a file called "cryproc" created in the /proc filesystem.
Maiden-core is a Linux kernel robotics API module, extensible in Erc. The Maiden Project also documents and develops the Maiden architecture for mobile robots, a set of (optional) designs and standards for robots using the Maiden-core API.
Development area for GNU/Linux 2.6.x for the KS8695 ARM SoC. Covers kernel patches, drivers for serial, Ethernet, PCI, GPIO, watchdog subsystems, and drivers for optional PCI based devices such as USB, WiFi, WiMAX, IPSec, SSL, and RSA devices.
niab - Network In A Box.
Create a virtual lab network inside one machine. A lab can include routers, firewalls, clients and servers connected by a network specified by you. [Linux Network Simulator, UML, user mode linux]
The Cocoon Adaption Kit is a NetKernel module which enables the use of Cocoon Components (Generators, Transformers, Serializer, Actions) from within the NetKernel XML Application Server.
Shfs is a simple and easy to use Linux kernel module which allows you to mount remote filesystems using (secure) shell connection. It comes with rpm/deb package support.
Network to serial port data relaying linux kernel module. Used for duplication of network ingress data, to serial port (TTY S) driver egress buffer.Serial line choice could be configured via sysctl and via proc fs (/proc/sys/net/core/zercopy_serial).
The Enforcer is a Linux Security Module designed to improve integrity
of a computer running Linux by ensuring no tampering of the
filesystem. It can interact with TCPA hardware to provide higher
levels of assurance for software and sensitive data.
This project allows users to create their own lower-level network
(such as TCP/IP or another protocol) stack implementations below
the sockets layer by converting the current socket layer into a
functional API.
A microkernel operating system distribution offering (among other things) very low hardware requirements, full and easy portability and easy-readable source code.
Dateshift is a small kernel module for Linux 2.2-2.6. It shifts time of preset list of process names, based on configuration file. Shift value is represented in seconds in absolute and relative forms. This module may be valuable for developers.
REMUS is a kernel module for Linux, which controls the invocation of critical system calls.
The execution is granted only if the invoking process and the value of the arguments are found in an Access Control Database managed by the sysctl command
Live Security/Forensics Linux Distribution, built from scratch and packed full of tools useful for vulnerability analysis, penetration tests, and forensic analysis.