Other Useful Business Software
Orchestrate Your AI Agents with Zenflow Icon
Orchestrate Your AI Agents with Zenflow

The multi-agent workflow engine for modern teams. Zenflow executes coding, testing, and verification with deep repo awareness

Zenflow orchestrates AI agents like a real engineering system. With parallel execution, spec-driven workflows, and deep multi-repo understanding, agents plan, implement, test, and verify end-to-end. Upgrade to AI workflows that work the way your team does.
Try free now
Our Free Plans just got better! | Auth0 Icon
Our Free Plans just got better! | Auth0

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Total Network Visibility for Network Engineers and IT Managers Icon
Total Network Visibility for Network Engineers and IT Managers

Network monitoring and troubleshooting is hard. TotalView makes it easy.

This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
Learn More
PeerGFS PEER Software - File Sharing and Collaboration Icon
PeerGFS PEER Software - File Sharing and Collaboration

One Solution to Simplify File Management and Orchestration Across Edge, Data Center, and Cloud Storage

PeerGFS is a software-only solution developed to solve file management/file replication challenges in multi-site, multi-platform, and hybrid multi-cloud environments.
Learn More
Criminal IP: Cybersecurity Search Engine Icon
Criminal IP: Cybersecurity Search Engine

Criminal IP is a comprehensive threat intelligence search engine that detects vulnerabilities of personal and corporate cyber assets in real time

Originated from the idea that individuals and corporations would be able to strengthen their cyber security by proactively acquiring information about IP addresses attempting to access your network, Criminal IP uses its big data of more than 4.2 billion IP addresses to provide threat-relevant information on malicious IPs and links, phishing sites, certificates, industrial control systems, IoTs, servers, security cameras, and so forth.
Learn More

Additional Details for SchilliX

Operating Systems

Solaris

Languages

German

Intended Audience

Developers, End Users/Desktop, Religion

User Interface

Console/Terminal

Programming Language

C

Registered

2005-03-29

Last Updated

Categories

Software Distribution, Operating System Kernels

Maintainers

schily

Keep Me Updated!