Cerb is a fast and flexible Web-based platform for business collaboration and automation. It helps you remember anything about anyone, collaborate from anywhere, deftly reply to a flood of email, automate, stay informed, capture feedback, track time, flag opportunities, manage tasks, share expert knowledge, and otherwise execute efficiently.
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of a multimedia file derived from various features from its content. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the features are similar. Potential applications include copyright protection, similarity searches for media files, or even digital forensics.
Arkeia Network Backup is designed for organizations that require fast, easy-to-use, and affordable data protection. It backs up critical data to disk, tape, and cloud storage. Arkeia protects all major virtual platforms including VMware, Hyper-V, XenServer, and more than 200 physical platforms including Windows, Mac OS X, Linux, Netware, most UNIX flavors, and BSDs. The company’s source-side Progressive Deduplication technology helps users realize better performance at a lower cost by reducing data volumes. Arkeia’s deduplication is crucial to accelerating replication of on-premise backups to private or public clouds.
CyaSSL is a C-language-based SSL library targeted for embedded and RTOS environments, primarily because of its small size and speed. CyaSSL supports the industry standards up to the current TLS 1.2 level, is up to 20 times smaller than OpenSSL, includes SSL client libraries and an SSL server implementation, includes an OpenSSL compatibility layer, and offers several progressive ciphers such as RABBIT and HC-128. Dual licensed under both the GPLv2 and standard commercial licensing, it caters to a wide range of projects.
Monetra is a scalable payment processing engine for Linux, Unix, and Windows. It is designed to handle credit, debit, gift, EBT, and check authorizations and is certified to support major clearing house protocols. Features include support for multiple modems, multiple merchant accounts, and multiple processors, all simultaneously -- as well as IP and SSL connectivity along side SQL database support. Designed in C, conforming to POSIX standards, and utilizing light weight processes (threads), this product is able to handle a large number of transactions with high speed and minimal CPU usage.
Jmx4Perl provides an alternate way of accessing Java JEE Server management interfaces that are based on JMX (Java Management Extensions). It is an agent-based approach where a small Web application deployed on the application server provides HTTP/JSON-based access to JMX MBeans registered within the application server. It is set up from a handful of Perl modules, which can be integrated seamlessly in your own programs. It also includes a Nagios plugin, check_jmx4perl, a jmx4perl command line tool for remote JMX queries and operations, and a readline-based JMX shell j4psh, with context sensitive command completion and syntax highlighting.
Z1 SecureMail Gateway is a central, server-based software solution that provides encryption and digital signatures (PGP and S/MIME) for the entire email traffic of an organization. It works with organizational certificates and certificates for individual users, groups, or organizational units. It provides its services transparently to end users. Z1 SecureMail Gateway automatically finds certificates of external users or companies via Internet. Secure email traffic to customers, suppliers, and partners is easily established. Evaluation packages for Debian and Solaris are available for download.
Zoom is a low-overhead graphical and command line profiler for Linux. Profiles are system-wide, precise down to the instruction level, and capture complete backtraces of C/C++/ObjC/Fortran/Assembly code. This lets you see exactly where time was spent, what code was running (user or kernel), and how that code was called. Drill down into a specific symbol, and Zoom shows source and assembly annotated with general and processor-specific tuning advice. It saves profiles as a single, self-contained session file that can be emailed or attached to bug reports. This lets you share what you find with colleagues or archive it for later review. Zoom also supports remote network profiling and scripting, making it ideal for embedded or server systems and automated workflows.