With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
OSI-Approved Open Source (564)
- GNU Library or Lesser General Public License version 2.0 (20)
- Academic Free License (13)
- Apache License V2.0 (11)
- BSD License (9)
- MIT License (5)
- Artistic License (4)
- Common Public License 1.0 (3)
- GNU General Public License version 3.0 (3)
- Open Software License 3.0 (3)
- Apache Software License (2)
- Educational Community License, Version 2.0 (2)
- Microsoft Public License (2)
- PHP License (2)
- zlib/libpng License (2)
- Attribution Assurance License (1)
- Public Domain (16)
- Other Operating Systems (564)
- Windows (525)
- Linux (351)
- Mac (281)
- Modern (250)
- Android (244)
Grouping and Descriptive Categories (121)
- 32-bit MS Windows (78)
- All 32-bit MS Windows (56)
- 32-bit MS Windows (29)
- All POSIX (27)
- 64-bit MS Windows (24)
- OS Portable (14)
- All BSD Platforms (11)
- OS Independent (10)
- Project is OS Distribution-Specific (2)
- Project is an Operating System Distribution (1)
- Project is an Operating System Kernel (1)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
The BOM is a useful utility for comparing snapshots of a file system by size, version, attributes, date, copyright and checksum.
I have to develop a 3D FPS game within the scope of a subject (Computer Graphics) at the Budapest University of Technology. The name of this simple game is BabszemJankó. The mission in the game is to reach all yout credits and complete all your subjects
An application for deployment files. Backup only the file to be changed
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
Software that detects the BPM in a mp3 file and are to: 1.- Put a "metronome click" over the song when played 2.- Mix songs matching the BPM
Biburu is a DualHead RealTime HTML/CSS/JS editor. The idea is to be abble to code a web page with the posibility of seeing the results (rendered like Firefox or IE) in real time in a separate screen.
Billy is a virtual agent that can to speak with you, it's a artificial intelligence and communication between human and computer, try it !
Black Mamba is a two-player version of the famous game Snake, in which the player has to catch apples without beat the head against itself or the maze. Also a single player mode is provided.
Прога не дает пользоваться компьютером если блокировка активна! Чтобы снять блокировку надо ввести пароль! Не забудьте его посмотреть
Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Sponsored Listing
Developing projects Bloody Team
Bulpor website, flash build and html.Bulpor websiteBulpor website, flash build and html.Bulpor websiteBulpor website, flash build and html.Bulpor websiteBulpor website, flash build and html.Bulpor websiteBulpor website, flash build and html.Bulpor websit
Burn your Neighbour is an administration site for this card game whihc uses EJB 3.0 and JSF(with AJAX) capabilities. It is aimed to provide a sample of how to use these Java based technologies.
Framework components used in many systems such as Memory Managers, Undo/Redo Managers, Logging utilities, Reference tracking, Profiling utilities, Version Tolerant Persistence, Reflection and advanced Debugging tools in C++.
The CM-Tools project contains a lot of useful tools which is easy to access through a desktop icon which can be minimized as TrayIcon. The main categories of CM-Tools are Date & Time, Development, Disk, Games, Graphics, Maths, Network, Office and System.
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
Simple Notepad Application
Calculs Elec est un logiciel open source qui vous permettra de faire des calculs de relations électrique. Dans logiciel, il vous sera possible de visionner de petites vidéos d'arc électrique, d'explosion de transformateur et encore plein d'autre.
This utility is to construct the interactive function call graph.
CartGen is a Cartesian grid generator that can generate uniform, octree (anisotropic/nongraded), immersed boundary Cartesian grids over complex geometry. Inpute geometry is some triangulated (water-tight) surfaces.
An World of Warcraft addon that kicks people who use offensive or racial material in world chat, or any other chat for that matter. Very easy to edit.
CharSCRIPT is a platform indepentent high speed developing language. The language has an assembler like synttax, but every command is very complex an modular.
Sistema para registro de entradas y salidas de personal.
This Project is an attempt to create an application that can easily create comic strips with SVG characters and backgrounds. It should be easy to use keeping COMIC CHAT as the base of the project and have a sleek and classy interface .
The half-life 2 modification, with a brand new story.
Open source instant messenger
CompLock will lock your computer COMPLETELY, only allowing access to the letters and numbers,for password. There is also a option that will lock all access to computer, and should stop remote access from controlling your computer.Beta 1/30/09 report bugs
The goal of the project is to design and create a modification of a radio controlled toy car so that the control can be achieved through the computer's LPT parallel port.