Simplify teamwork and stay in control of your communications with MegaPath One. Unified communications makes staying in touch with associates easy and efficient. See when others are available. Initiate a chat. Host a voice or video conference from any device, and invite guests to join via web browser. Handle matters quickly from your always-on virtual collaboration space with presence, instant messaging, video conferencing and screen sharing.Sponsored Listing
OSI-Approved Open Source (130)
- GNU General Public License version 2.0 (90)
- BSD License (11)
- GNU Library or Lesser General Public License version 2.0 (11)
- GNU General Public License version 3.0 (8)
- Python Software Foundation License (5)
- MIT License (4)
- Affero GNU Public License (3)
- Apache Software License (2)
- Common Public License 1.0 (2)
- Apache License V2.0 (1)
- Attribution Assurance License (1)
- European Union Public License (1)
- Fair License (1)
- GNU Library or Lesser General Public License version 3.0 (1)
- Qt Public License (1)
- Other License (4)
- Creative Commons Attribution License (2)
- Public Domain (2)
- Linux (126)
- Grouping and Descriptive Categories (89)
- Modern (77)
- BSD (55)
- Windows (54)
- Mac (44)
- Android (14)
- Other Operating Systems (5)
- Programming Language: Python ×
Auto Update munki products
Pisi is the next generation packaging system of Pardus GNU/Linux OS. piside is intended to showcase both the ease of developing packages as well as the capabilities of pisi.
Portage-r is alternative portage tree for gentoo, with unstable/svn/cvs etc. ebuilds which are not included in official portage tree.
With Infoblox DDI, your IT teams can consolidate DNS, DHCP, IP address management, & other core network services into a single platform. Orchestrate DDI functions for hybrid & public cloud & virtual & private cloud environments and access rich reporting & analytics capabilities for capacity planning, asset management, compliance control, & auditing. Boost IT efficiency & automation with seamless RESTful API integration.Sponsored Listing
pxeboot + buildroot + brute force = pxebrute
A windows python launcher based on py2exe that permits to generate portable applications.
iPods, PDAs, and mobile phones are locked down. Thanks to hardcore hackers, you can run Linux-based software on them. Then you can transform them into true read/write tools that free you to create your own gadgets. We are working to make that easy.
rpm-depcheck is a tool for checking the RPM dependencies of a specified command. It is useful, for example, for getting an indication of what should be included in the "BuildRequires" tag of a RPM spec file when compiling a program.
Script to keep your Slackware box updated with the packages of the current set.
Find bottlenecks fast with line-level timings for all your .NET code – C#, VB.NET, any .NET language. Plus, check database query performance to see if the bottleneck is there. Now includes SQL Server execution plan profiling. Try ANTS Performance Profiler on your application now.Sponsored Listing
Sling is a graphical launcher of application. It was mainly developed to provide to a bunch of linux nodes applications installed on an nfs server.
Source based automated packet manager.
This is an application's launcher developped at the University of Geneva. It provides GUI & CLI. The applications are located in 1 or more repository. Each application is contained in only one folder. The repository are accessed by NFS.
Warp is a recursive backronym for 'Warp is An Rss Package-manager', it is a package manager using RSS as opposed to repositories. It is designed to complement system applications with a number of methods to download and install third party applications that have not been packaged for a given distribution of Linux. There are no downloadable releases at the moment, everything is done via mercurial right now.
A queries management software. It was primary designed for an IT team to manage the incidents, but can be used to manage any query, inside or outside an organization. Can be appropriate for Service Desk management.
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing