OtrosLogViewer (OLV) is software for analyzing an application's logs and stack traces. It loads logs from remote servers using ftp, sftp, ssh, samba and other supported filesystems, listening on a socket, or connection to a Log4j SocketHubAppender. Logs can be gzipped, and OLV will decompress them on the fly. Many log formats are supported (JDK logging, Log4j XML, and custom patterns). OLV allows log highlighting. Automatic log highlighting is based on string matches, regular expressions, or custom Java code. Notes can be added to log events. Display of message details can be customized by message formatters and a colorizer (i.e., formating SOAP request and highlighting XML syntax). OLV can be extended by plugins (filters, log parsers, log event markers, message detail formatters, and colorizers).
BitNami Enano CMS Stack is an easy-to-use installer for Enano CMS, a content management system that strives to have "less bloat and more float" than other solutions. It includes powerful administrative capabilities and a variety of plugins to add portals, forums, blogs, and other functionality.
OpenLaszlo Schema Generator provides methods to enhance LZX-Markup from the OpenLaszlo RIA with full schema/namespace support and validation. You can run it from the command line or from inside your project using ANT. The JAR contains tasks to generate an XSD from your project LZX files; by doing that, you have full Schema Validation in Eclipse, and it will show you all your XML schema errors. The validation is aware of ALL tags and attributes: the LZX base components (+incubator) and your project specific code. Further, you get content-sensitive drop down menus for Tags and Attributes.
With the Cibet framework, it is very easy to add various control mechanisms into a JPA and/or EJB-based Java application. The actual version includes control schemes like Archiving (manipulation of domain objects; data and execution of business processes are archived). From the archived state, domain objects can be reconstructed and business processes can be re-invoked with the same parameters at any time. The archive entries are secured against manipulation to make them audit-proof and revision safe. Four-eyes principle: this scheme is an example of a dual control mechanism: A user wants to perform some critical data manipulation or business process. With an applied dual control mechanism, the action is not executed in the production system directly, but stored and postponed. A second user must check the data and the action and can approve or decline. Only when the second user approves, the data manipulation or business process is executed in the production system; otherwise it is discarded. An even stricter example for a dual control mechanism is the six-eyes principle. In this case, a third user must approve a data manipulation or business process before it will become productive.