Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Sponsored Listing
OSI-Approved Open Source (39)
- GNU General Public License version 2.0 (8)
- Artistic License (3)
- GNU Library or Lesser General Public License version 2.0 (3)
- Attribution Assurance License (2)
- Adaptive Public License (1)
- Affero GNU Public License (1)
- Apache License V2.0 (1)
- Apache Software License (1)
- Computer Associates Trusted Open Source License 1.1 (1)
- NASA Open Source Agreement (1)
- Open Software License 3.0 (1)
- PHP License (1)
- W3C License (1)
- Public Domain (3)
- Creative Commons Attribution License (1)
- Linux (37)
- Windows (37)
- Android (22)
Grouping and Descriptive Categories (19)
- OS Independent (16)
- All POSIX (4)
- OS Portable (4)
- All 32-bit MS Windows (3)
- All BSD Platforms (3)
- 32-bit MS Windows (2)
- 32-bit MS Windows (2)
- 64-bit MS Windows (2)
- Classic 8-bit Operating Systems (2)
- Project is OS Distribution-Specific (2)
- Project is an Operating System Distribution (2)
- Project is an Operating System Kernel (2)
- Other Operating Systems (6)
- BSD (4)
- Modern (4)
- Embedded Operating Systems (3)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Bottwi is an artificial intelligent bot for the world awarded social network: Twitter.2 weekly downloads
DBLX3 Relational Database System2 weekly downloads
Automatic Arabic Domain-Relevant Term Extraction1 weekly downloads
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing
This program reads the output traces of MITSIMLab and converts them into a format which can be read and visualized by Ns 2.1 weekly downloads
Information TESEO database, obtained for scientometric research1 weekly downloads
Genetic Network Analysis (GNA)1 weekly downloads
iCamp is a research and development project funded by the European Commission. The project aims at creating an infrastructure for collaboration and networking in Higher Education across systems.1 weekly downloads
This project is aimed at creating a set of highly universal AI tools to be used in AI modelling. So far the subject area includes: Neural Networks, Fuzzy Logic, Biological Methods, Genetic Computing. New tools will be devised as the project goes on.
With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
El tema 3 que no pude mandar.
BLibrestez Robotics Software Library Project
ClearCode is a system using mod_rewrite and ajax to hide your web pages source code this will work by mod_rewrite Requirements NOT TO BE EDITED OR USED OTHER THAN PROTECTION OF DATA
This tool identifies expected answer types (EAT) of natural language questions. The EAT is an automatically assigned semantic label (e.g. “PERSON”, “LOCATION”, etc) which is used by the system to reduce the search space of candidate answer.
Our aim is providing fixed nodes with redundancy, share unused bandwidth, and create hotspots with base services(web,email,IM,etc.) for any roaming user. GOAL - To make sharing your excess bandwidth as easy as setting up a NAT (Or XP ICS). Admins Needed!
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Sponsored Listing
This is a simple DES algorithm implemented in FPGA platform. Mainly this system was written by C and interpreted into VHDL.
Firetrap is a distributed FTP daemon providing load balancing and efficient bandwidth usage for worldwide mirror services.
A generic interface between robots. This is an attempt to formalize a simple protocol for communikating between robots - with concern of the actual media.
A simple utility that allows you to search for a class file within JARs, within your local filesystem, and return all the matching JAR file and their locations.
This is a project to test JAX-WS implementation.
Articulated arm (Mitshubishi's RV-M1 Movemaster) support for Cyberbotics' Webots simulation package. Offers seamless control of simulated arm via TCP/IP, and adequate client-side bridges for simulation (TCP/IP) and live robot (RS232).
Builds a standard JMenuBar - with all its menus, menu items along with their basic functionalities - from an external, well-formed, XML Document.
A piece of JAVA to connect SOS-T and WPS
OW Baby is OneWire Slave implementation for PIC16F628 and similar Micro-controllers. With it, you can rule your ultra cheap MCU with using One Wire protocol. ASM language and IRQ used. Code works on 4Mhz internal clock.
Securing mails without involving user. Secures them as often as possible if it is possible. Shows security-state and process of mails and mail-partners.
PAPI is a platform independent phylogenic API, based on PHYLIP (Joe Felsenstein).
Configure a Linux server to provide H.323 fireall traversal for Polycom High Definition endpoints.