Showing 2 open source projects for "system ram information"

View related business solutions
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • Vibes don’t ship, Retool does Icon
    Vibes don’t ship, Retool does

    Start from a prompt and build production-ready apps on your data—with security, permissions, and compliance built in.

    Vibe coding tools create cool demos, but Retool helps you build software your company can actually use. Generate internal apps that connect directly to your data—deployed in your cloud with enterprise security from day one. Build dashboards, admin panels, and workflows with granular permissions already in place. Stop prototyping and ship on a platform that actually passes security review.
    Build apps that ship
  • 1
    Syncdrome

    Syncdrome

    Syncdrome: Fast, smart file catalog & search for your drives

    Syncdrome is a standalone tool that creates a comprehensive catalog of files from your personal hard drives. It enables rapid keyword searches, delivering results in a style similar to web search engines. When a drive is connected, you can directly open files with your system’s default applications. The application lets you designate a working folder for storing the file catalog, which can even be located on a cloud storage service like Dropbox or Google Drive for easy access from any...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 2
    Underscore Backup

    Underscore Backup

    Private, secure backups in the cloud.

    Private, secure backups in the cloud of any size with minimal resource usage exactly the way you want them. Your data is encrypted by default using encryption keys only available to you and before leaving your network. Backed up data is signed to ensure protection from tampering. Data can be stored with any amount of redundancy and even multiple backup locations simultaneously. No information about the contents of your data is saved in any backup location. Only you can download and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next