ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
OSI-Approved Open Source (569)
- GNU General Public License version 2.0 (351)
- GNU Library or Lesser General Public License version 2.0 (51)
- BSD License (47)
- GNU General Public License version 3.0 (37)
- Academic Free License (30)
- Apache License V2.0 (23)
- MIT License (14)
- Common Public License 1.0 (11)
- Open Software License 3.0 (11)
- GNU Library or Lesser General Public License version 3.0 (8)
- PHP License (7)
- Apache Software License (6)
- Mozilla Public License 1.0 (5)
- Affero GNU Public License (3)
- Educational Community License, Version 2.0 (3)
- Public Domain (78)
- Other License (25)
- Creative Commons Attribution License (20)
- Other Operating Systems (706)
- Windows (638)
- Mac (575)
- Android (497)
- Modern (194)
Grouping and Descriptive Categories (102)
- All POSIX (54)
- 32-bit MS Windows (42)
- All 32-bit MS Windows (42)
- 64-bit MS Windows (30)
- All BSD Platforms (29)
- OS Portable (26)
- OS Independent (23)
- 32-bit MS Windows (18)
- Project is OS Distribution-Specific (2)
- Project is an Operating System Distribution (2)
- Classic 8-bit Operating Systems (1)
- Project is an Operating System Kernel (1)
- BSD (83)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
The half-life 2 modification, with a brand new story.
Open source instant messenger
CoderJLibrary VS2003 .net 1.1 vb.net
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
Color Hound - A pure java color picker
A comic book reader targeting .net
CompLock will lock your computer COMPLETELY, only allowing access to the letters and numbers,for password. There is also a option that will lock all access to computer, and should stop remote access from controlling your computer.Beta 1/30/09 report bugs
A Simple Software that can calculate Complex Numbers, for Academic use. Binomic (a+bi) & CIS.
The goal of the project is to design and create a modification of a radio controlled toy car so that the control can be achieved through the computer's LPT parallel port.
There's no event quite like OSCON—the best place on Earth to sharpen your skills and discover new techniques, making you better at what you do and igniting your love of all things digital. You'll find everything open source: languages, communities, best practices, products and services. Join us May 8-11 in Austin, TX, and let OSCON ignite your love of all things digital!Sponsored Listing
A Content Management System writen in PHP. It's a easy project, and everybody can help!
Software for piece of advice control and commercial union.
Classic & Modern Cryptography tools
This my own version of a Crysis 2 advanced graphics editor. It's my first public project, I hope that it helps people learn something. Any queries just drop me a message on sourceforge.
Con Cuccu-leo puoi controllare a distanza il tuo PC quando vuoi e da dove vuoi :D
Simplify teamwork and stay in control of your communications with MegaPath One. Unified communications makes staying in touch with associates easy and efficient. See when others are available. Initiate a chat. Host a voice or video conference from any device, and invite guests to join via web browser. Handle matters quickly from your always-on virtual collaboration space with presence, instant messaging, video conferencing and screen sharing.Sponsored Listing
Este es un programa que tiene como objetivo ser un apoyo para los estudiantes de patología y NO busca reemplazar el curso sino ser un apoyo para el estudio del mismo.
Cyber Cafe Software including Laptop Timer without installation on Lap
CycleScope is a Warehouse management system concerning itself with, as you can imagine, warehouse managment. Inventory, Location, and Cycle management are the main core competencies we're shooting for.
Cyclone is a Java application for quickly placing points on a 2D plan or in a form, in order to draw cyclone courses.
Cynergy is a small 3D engine based on OpenGL and SDL supporting multiple texture formats, scenegraphs and shaders.
Discover Nintex Workflow Cloud - the fastest, easiest way to improve the way you do business. This state-of-the-art technology - built in the cloud, for the cloud - gives you the ability to create powerful, integrated workflows independent of any single platform. With our intuitive, drag-and-drop workflow design canvas, you can configure and deploy automated business processes with speed and simplicity. Try it today!Sponsored Listing
DBTime is a little application to generate rich time dimensions for datawarehouses and populate them with data in a easy way (wizzard assisted).
DNIBot is an IRC bot, written in .NET, with an excellent plugin model for great extensibility, and almost complete remote managability (via IRC of course).
PDI's system of stock control. This project is exclusive use for DPI's internal control. Only authorized people can modify, use, etc. This project use Delphi with SQL Server. The components are different that Delphi's common components.
A small easy to use scripting language for use in Visual Basic projects, or anything accepting ActiveX DLLs.
Script para IRC totalmente libre y gratuito que incluye infinidad de opciones
A project to recreate Blood on the Quake 3 engine. The game will have the same feel as Blood, because it was have the exact same levels, and use sprites instead of 3d models.
This small project allows support team members to collect and analyze debugging information.