Other Useful Business Software
Our Free Plans just got better! | Auth0 Icon
Our Free Plans just got better! | Auth0

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Deliver trusted data with dbt Icon
Deliver trusted data with dbt

dbt Labs empowers data teams to build reliable, governed data pipelines—accelerating analytics and AI initiatives with speed and confidence.

Data teams use dbt to codify business logic and make it accessible to the entire organization—for use in reporting, ML modeling, and operational workflows.
Learn More
Comet Backup - Fast, Secure Backup Software for MSPs Icon
Comet Backup - Fast, Secure Backup Software for MSPs

Fast, Secure Backup Software for Businesses and IT Providers

Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
Learn More
Create and run cloud-based virtual machines. Icon
Create and run cloud-based virtual machines.

Secure and customizable compute service that lets you create and run virtual machines.

Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
Try for free
All-in-one security tool helps you prevent ransomware and breaches. Icon
All-in-one security tool helps you prevent ransomware and breaches.

SIEM + Detection and Response for IT Teams

Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
Learn More

Additional Details for jisql

Languages

English

Intended Audience

Developers

User Interface

Command-line

Programming Language

Java

Registered

2007-02-23

Last Updated

Categories

Front-Ends, Command Line Tools, SQL Clients, Database Clients

Maintainers

stdunbar

Keep Me Updated!