2 projects for "using" with 2 filters applied:

  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Outgrown Windows Task Scheduler? Icon
    Outgrown Windows Task Scheduler?

    Free diagnostic identifies where your workflow is breaking down—with instant analysis of your scheduling environment.

    Windows Task Scheduler wasn't built for complex, cross-platform automation. Get a free diagnostic that shows exactly where things are failing and provides remediation recommendations. Interactive HTML report delivered in minutes.
    Download Free Tool
  • 1
    A UNIX Shell script wrapper for the VI editor. It is recommended VIB be used as an alias for the VI editor. VIB creates backups of any files edited using VI to a specified location while maintaining X backup revisions, and keeping a revision history of who made changes and when to a master log. VIB is Ideal in environments where you have multiple users logging into a UNIX system and you wish to keep track of whom is modifying files. For example, VIB could be 'aliased' in all new user shell accounts, so that when they edit a file using "vi", a log entry will be generated, and a backup copy of the file with their username will also be notated. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Encrypting Safe
    This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next