TOra is a Toolkit for Oracle that helps the DBA or developer of a database application. It features an SQL worksheet with PL/SQL block parsing, a PL/SQL debugger and editor with syntax highlighting, a Schema browser, Unicode support, printing, and a full suite of DBA management tools.
The goal of the X-itools project is to propose an alternative to products like Exchange or Lotus Notes/Domino. They are composed of several modules, and this project has been under development for several years. Modules include a shared public and private agenda, a flow-chart, task, and post-it manager, a visitors and associated badges manager, a password and history manager (with the ability to encrypt things other than passwords), a holiday manager (to manage public vacation days, illness periods, absence periods according to country profiles), a shared public and private address book, an incoming and outgoing phone calls manager, and a global management module.
This project is a network weather map creator and network traffic statistics collector. It uses SNMP to collect data from various network devices and stores them in a database. It prints the collected data on existing images creating nice weather maps. Weather maps are designed from an easy to use Web-based interface.
Akeni Secure Messaging server is a secured client/server instant message solution for business. It supports standard messaging features such as chat, conference (group chat), notification, and file transfer, and a rich client. The Expert Edition also offers advanced enterprise IM features such as 128-bit encryption and server side message logging. Messages can be logged into a full searchable database or flat files for auditing purposes. The system also offers enterprise manageability through the use of shared folders and role-based user access rights.
Netinfo is a IP/MAC address locater for switched networks. It collects information from routers and L2/L3 switches and combines them to provide IP-MAC, IP-switch interface, and MAC-switch interface pairs. This makes it possible to determine the exact location of an IP or a MAC address in a network. It supports policy configuration and violation detection and can location duplicate IPs and IP address changes. It can also be used to monitor access to switch interfaces and stores a history of all collected information. Experimental support for automatic user lock-out in the event of violations is also included. It works with Cisco devices and is intended for use by NOCs and network administrators.