Other Useful Business Software
Zenflow- The AI Workflow Engine for Software Devs Icon
Zenflow- The AI Workflow Engine for Software Devs

Parallel agents. Multi-agent orchestration. Specs that turn into shipped code. Zenflow automates planning, coding, testing, and verification.

Zenflow is the AI workflow engine built for real teams. Parallel agents plan, code, test, and verify in one workflow. With spec-driven development and deep context, Zenflow turns requirements into production-ready output so teams ship faster and stay in flow.
Try free now
Our Free Plans just got better! | Auth0 Icon
Our Free Plans just got better! | Auth0

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Total Network Visibility for Network Engineers and IT Managers Icon
Total Network Visibility for Network Engineers and IT Managers

Network monitoring and troubleshooting is hard. TotalView makes it easy.

This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
Learn More
Criminal IP: Cybersecurity Search Engine Icon
Criminal IP: Cybersecurity Search Engine

Criminal IP is a comprehensive threat intelligence search engine that detects vulnerabilities of personal and corporate cyber assets in real time

Originated from the idea that individuals and corporations would be able to strengthen their cyber security by proactively acquiring information about IP addresses attempting to access your network, Criminal IP uses its big data of more than 4.2 billion IP addresses to provide threat-relevant information on malicious IPs and links, phishing sites, certificates, industrial control systems, IoTs, servers, security cameras, and so forth.
Learn More
DriveStrike: Remote Wipe | Data Breach Protection Icon
DriveStrike: Remote Wipe | Data Breach Protection

. From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.

DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
Learn More

Additional Details for HWSensors3

Operating Systems

Mac

Languages

English, Italian, Russian

Intended Audience

End Users/Desktop

User Interface

Cocoa (MacOS X)

Programming Language

C++, Swift

Registered

2014-12-15

Last Updated

Maintainers

blusseau, kozlek, slice2009

Keep Me Updated!