YourKit Java Profiler is a CPU and memory profiler that makes it easy to solve wide range of CPU- and memory-related performance problems. It features automatic leak detection, powerful tools for the analysis of memory distribution, an object heap browser, comprehensive memory tests as part of your JUnit testing process, extremely low profiling overhead, transparent deobfuscation support, and integration with Eclipse, JBuilder, IntelliJ IDEA, NetBeans, and JDeveloper IDEs.
Jat (Java Application Template) is a Java framework that is easy to extend. It supplies modular and flexible basic functionalities to develop Web and standalone applications. It can improve application start-up time. Jat Portal is an enhanced version of Jat. It provides several pre-configured features to build a complete Web application.
LiKee (which stands for LIne KEEper) is a monitoring system for supervision of Web applications and pages. It is a tool for automation of service processes of uptime-critical Web applications. It periodically monitors remote pages and evaluates their content with regular expressions. It can send alerts through email, GSM calls, and SMS. It offers Web-based administration and reporting with advanced graphical design.
Butterfly Web UI is a component based Java Web application framework. Like the rest of the Butterfly Components, Butterfly Web UI is extremely small and very flexible. Butterfly Web UI uses Butterfly Container internally, a state of the art dependency injection container. Using Butterfly Web UI, it is easy both to generate HTML for a Web browser or XML or JSON for a RIA frontend (Flex, JavaFX, Silverlight) or AJAX frontend. You also can easily create HTML layout templates that are reused throughout your Web application, so you don't have the layout hardcoded into every page. You can easily mix RIA and non-RIA Web application technology in the same Web application.
With the Cibet framework, it is very easy to add various control mechanisms into a JPA and/or EJB-based Java application. The actual version includes control schemes like Archiving (manipulation of domain objects; data and execution of business processes are archived). From the archived state, domain objects can be reconstructed and business processes can be re-invoked with the same parameters at any time. The archive entries are secured against manipulation to make them audit-proof and revision safe. Four-eyes principle: this scheme is an example of a dual control mechanism: A user wants to perform some critical data manipulation or business process. With an applied dual control mechanism, the action is not executed in the production system directly, but stored and postponed. A second user must check the data and the action and can approve or decline. Only when the second user approves, the data manipulation or business process is executed in the production system; otherwise it is discarded. An even stricter example for a dual control mechanism is the six-eyes principle. In this case, a third user must approve a data manipulation or business process before it will become productive.