Showing 7 open source projects for "jre-6u45-windows-i586.exe"

View related business solutions
  • Multi-Site Network and Cloud Connectivity for Businesses Icon
    Multi-Site Network and Cloud Connectivity for Businesses

    Internet connectivity without complexity

    As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 1
    Platform-independent recursive search library. C-API, written in C/C++, with mappings to C++, COM, D, Java, .NET, Python, Ruby, STL, with more to come.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Solarstorm

    Solarstorm

    A rethinking of the Operating System Ecosystem.

    This is the fifth or sixth generation of this idea, the big difference being that we have written some bootloader code and have started mapping out the kernel layout and structure. We have decided upon a core programming language for the kernel, and the core language for almost everything else. With a focus on isolating the MAJOR kernel features from the system itself, in what until now has remained research only instances, we hope to create a fully functioning exokerne. All code at...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Anime checker is a portable tool that verifies the integrity of your files. It calculates the CRC32 of your files and compares it with the one found in the filename. Useful with fansubbed animes.
    Downloads: 6 This Week
    Last Update:
    See Project
  • 4
    The DTraceToolkit is a collection of over 200 useful documented scripts for analysis of system and process behaviour. It allows in-depth inspection without disturbance of the system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Propelling Payments for Software Platforms Icon
    Propelling Payments for Software Platforms

    For SaaS businesses to monetize payments through its turnkey PayFac-as-a-Service solution.

    Exact Payments delivers easy-to-integrate embedded payment solutions enabling you to rapidly onboard merchants, instantly activate a variety of payment methods and accelerate your revenue — delivering an end-to-end payment processing platform for SaaS businesses.
  • 5
    Fsum Frontend is a files integrity checker. It can calculate 96 hash and checksum algorithms(CRC32, MD5, SHA1, SHA2, ADLER, DHA256, FORK256, ...). You can verify your files using a .sfv/.md5/.sha1/.sha2 file or create your own checksum file.
    Leader badge
    Downloads: 50 This Week
    Last Update:
    See Project
  • 6
    "gum" is an Open-Source file-archiving program, like GNU's "tar". The goal of this project is to create an easy-to-use, fast archiver that produces an output less than that of GNU's "tar".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Voodoo Exchange Networking Library is a D library that provides a simple API for creating streaming, peer-to-peer TCP connections between two clients, even if they are behind NATs or firewalls, by attempting multiple NAT traversal algorithms.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next