RSS 18 projects tagged "Apache 2.0"

No download Website Updated 08 Sep 2009 Lucis

Screenshot
Pop 14.11
Vit 41.02

Lucis provides a framework for building checkpoint-based index services on top of the Lucene search engine.

Download Website Updated 21 Dec 2009 BOAPI

Screenshot
Pop 18.84
Vit 39.74

BOAPI is an implementation of default often used business objects in different programming languages with an identical public interface. It supports PHP 5.3 (with namespaces), C# (.NET port), and Java.

Download Website Updated 12 Feb 2011 Terrastore

Screenshot
Pop 94.87
Vit 4.03

Terrastore is a modern document store which provides advanced scalability and elasticity features without sacrificing consistency.

No download Website Updated 14 Dec 2010 MASH

Screenshot
Pop 31.94
Vit 2.51

MASH is a modular, automated script harness. It allows users to implement simple harnesses that perform work external to a system. The framework will invoke that harness as outlined by an XML script. For example, when using the framework to test a system you could create a script that cleans and loads a database, FTPs some data, submits a login form, and verifies HTTP information. Harnesses can easily be built to do almost anything (many harnesses are provided), not just Web page verification. While harnesses are written in Java, the scripts may be run against any type of system as harnesses are intended to act as clients.

No download Website Updated 23 Feb 2010 Cibet

Screenshot
Pop 17.35
Vit 38.92

With the Cibet framework, it is very easy to add various control mechanisms into a JPA and/or EJB-based Java application. The actual version includes control schemes like Archiving (manipulation of domain objects; data and execution of business processes are archived). From the archived state, domain objects can be reconstructed and business processes can be re-invoked with the same parameters at any time. The archive entries are secured against manipulation to make them audit-proof and revision safe. Four-eyes principle: this scheme is an example of a dual control mechanism: A user wants to perform some critical data manipulation or business process. With an applied dual control mechanism, the action is not executed in the production system directly, but stored and postponed. A second user must check the data and the action and can approve or decline. Only when the second user approves, the data manipulation or business process is executed in the production system; otherwise it is discarded. An even stricter example for a dual control mechanism is the six-eyes principle. In this case, a third user must approve a data manipulation or business process before it will become productive.

No download No website Updated 27 Mar 2010 Dummy Data Generator

Screenshot
Pop 28.64
Vit 38.51

Dummy Data Generator is a tool that generates dummy data for populating systems for testing. The data includes names, addresses, email addresses, phone numbers, and social "connections". Names are generated by using US Census data on the most common names. Email addresses are just a random string for the user portion and always use "example.com" for the domain. Currently the only output format is CSV.

Download Website Updated 03 Jan 2011 persistence4j

Screenshot
Pop 52.31
Vit 2.80

persistence4j is a small and lightweight Java object persister that uses JDBC to persist data into a relational database. The library frees you from writing the Data transfer objects - just create a POJO and simply save it. Transactional and non-transactional connections are supported and can be configured from the simple properties file.

No download No website Updated 07 Sep 2010 swing-formbuilder

Screenshot
Pop 41.71
Vit 1.42

swing-formbuilder is a Java library that generates Swing components from Java beans at runtime.

No download No website Updated 21 Apr 2011 Google Authenticator Demo

Screenshot
Pop 19.80
Vit 33.07

Google Authenticator Demo is an implementation of two-factor authentication using the Google Authenticator that can be used on your own site or application. It allows you to register a user name and then log in using the information provided by the Google Authenticator. It also works with OATH HOTP compliant hardware tokens.

Download Website Updated 22 Apr 2011 pegdown-cli

Screenshot
Pop 37.39
Vit 1.41

pegdown-cli is a command line tool that uses the pegdown library to render Markdown.

Screenshot

Project Spotlight

OrientDB

A high performance document database.

Screenshot

Project Spotlight

TOMUSS

An interactive Web spreadsheet allowing concurrent table editing.