Lose the spreadsheets. Get Infoblox DDI: Consolidate DNS, DHCP, IP address management into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments. Access rich reporting & analytics capabilities for capacity planning & asset management. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
OSI-Approved Open Source (35)
- GNU General Public License version 2.0 (18)
- Academic Free License (5)
- GNU Library or Lesser General Public License version 2.0 (5)
- BSD License (3)
- GNU General Public License version 3.0 (3)
- GNU Library or Lesser General Public License version 3.0 (2)
- Adaptive Public License (1)
- Affero GNU Public License (1)
- Apache License V2.0 (1)
- Artistic License 2.0 (1)
- Open Software License 3.0 (1)
- Sun Public License (1)
- Public Domain (7)
- Creative Commons Attribution License (4)
- Other License (2)
- Other Operating Systems (50)
- Windows (42)
- Modern (32)
- Linux (28)
Grouping and Descriptive Categories (18)
- All 32-bit MS Windows (11)
- 32-bit MS Windows (10)
- All POSIX (8)
- 64-bit MS Windows (7)
- 32-bit MS Windows (6)
- All BSD Platforms (3)
- OS Independent (3)
- OS Portable (3)
- Classic 8-bit Operating Systems (1)
- Project is OS Distribution-Specific (1)
- Project is an Operating System Distribution (1)
- Project is an Operating System Kernel (1)
- Mac (17)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
admix, windows web hosting control panel support; windows server 2000, windows server 2003 and windows server 2008
Ambientes de Suporte ao Ensino-Aprendizagem
2D Finite Element Analysis for Acoustics13 weekly downloads
If you'd like to spend less time on integrating data sources and focus on more fun stuff, give Talend Open Studio a try. It's free and open source.Sponsored Listing
Rex-SCA is a project which focus on the research in the field of Side Channel Attack, one hot issue of Crypto Analysis and Power Analysis attacks target the implementation of cryptographic devices. Rex is the project holder.
A hardware supported hypervisor originally built for malware analysis. Features: Linux VM introspection, minimal detectability, small (~150KB), simple, and well documented. Can be used for other purposes. Support for Intel-VT & Windows coming soon.
This is a command line based Physics Simulator that can export data to a spreadsheet program. Awesim Physics can be used to simulate everything from a ball being thrown upwards to the obits of planets in a solar system.6 weekly downloads
SIMRI: a versatile and interactive Magnetic Resonance Imaging (MRI) simulator. Such a simulator is a command line software written in C that reproduces the physical phenomenas encountered during an MRI acquisition to produce a realistic MRI image.11 weekly downloads
MSGraph is a program designed for the interactive, fast, qualitative analysis of mass spectrometric (MS) data. It is a tool to provide fast and simple access to all the information contained in an LC/MS analysis run.
Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
Fiona is a tool to automatically analyze the interactional behavior of a given oWFN. It provides two techniques: it checks for the controllability of the given net by computing the interactiong graph and it calculates the operating guideline for the net.
Pure object based operating environment, script language, shell, loads plugins to extend functionality, it's a MUD gone awry.
C# Website system. This is going to be the "Newer" Internet, and even has a custom theme system. This is going to let users do "anything" that won't harm the client computer in any way.
Elite is a 3rd Generation Peer to Peer Project
Narrows search result produced by popular Internet search engines, allowing to put extra filtering conditions, as certain words presented, certain words excluded, and so on.
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
This is a .NET application which allows a user to easily test a RESTful service by editing an HTTP request, then sending it via PUT, POST, GET or DELETE to a URI, and viewing/saving the results.
VIRGO (P2P software) aims to implement large scaleable Network with easy management and scalable security. VIRGO can be used in the fields such as Grid computing, Distributed Domain Name System, distributed search engines, and file shares.
A program written in .Net 3.5 to help small investors do useful calculations and analysis and graphing, integrate their brokers to do transactions, and in the future hopefully make stock predictions with a high accuracy rate and automation.
Implementation of an Interval Iterative Closest Point that uses intervals to found the global optimal solution. ICP can be used in vision technologies and photogrametry as pattern mathcing and as geometrical model finder.1 weekly downloads
ProTag integrates biological web services and online databases seamlessly into the Microsoft Office applications Word, Excel and PowerPoint. It is extensible and offers smart tagging of biological objects (e.g. protein names) within Office documents.
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
This is a free Traffic Simulator project.
The MXControl project aims to create a set of tools to extend and administrate the Chat-channels on the WinMX Peernetwork. Part of this projects are BendMX that adds features to the Chat, and a full featured Chatbot for administrative and other tasks.4 weekly downloads
Web-Based Academic course system for assigning students to courses written in JAVA with pgsql DB and evolutionary algorithm for assigning students to course requests. Multiple roles for users: Admin, Student, Teacher or Tutor. International localization.
Sistema para Controlar semaforo de cuarto de milla, basado en micropic y Visual Basic para controlar corredores y luces de semaforo. System for controlling a light tree for quarter of mile competitions based on micropic and Visual Basic
Logiciel libre de calcul et de CAD pour géomètres Le but poursuivi est de réaliser un logique libre permettant l'entrée de donné issues des carnets de terrains, de les calculer et de générer automatiquement le fond de plan.
EverCrack cryptanalysis engine. The goal is cryptanalysis of any class of cipher. The focus now is the kernel - cryptanalysis of unilateral monalpha substitution ciphers extremely quickly, and later, cryptanalysis of complex ciphers for the kernel.8 weekly downloads
analysis tool enables user to run differential expression on clusters