P* (P-star) is a Web programming language that incorporates common tasks like template handling and database queries into the language. It features MySQL database access with prepared statements, HTML templates, standard arithmetic and variables, functions, structs, (to-be-classes), JSON output, and GET and POST.
Giada is a minimal, hardcore audio tool for DJs and live performers. Just pick your sample, drop it in any channel, and start the show by using this tiny piece of software as a loop machine, drum machine, sequencer, live sampler, or effect (VST) host. Giada aims to be a compact and portable virtual device for production use and live sets.
Siren Renamer is a tool that renames, moves, and copies files using an expression. A lot of information associated with a file can be used, including name, extension, dates, and selection number. Other information is extracted from files according to their type: audio, video, image (standard and raw), EXIF, IPTC, Office document, PDF, ePub, HTML, and many others. Many different operations can be performed on character strings, complete directory trees can be processed, and images can be viewed. For example, to change a file name to uppercase with the mp3 extension, the expression can be '%ub.mp3'.
DEMUX Framework enables Java developers to build modular, cross-platform applications which can run on desktop, Web, and mobile and embedded devices. It is based on OSGI and supports creating JavaFX desktop applications, mobiles apps (Android, iOS, Windows), and Web applications.
TruPax is a tool for creating TrueCrypt volumes directly from files and folders. Volume sizes are precisely adjusted to the actual amount of data, so there is no slack. They mount on any modern OS and are of UDF 1.02 format. Creation happens quickly and directly, by creating the file system structures in the encrypted container on-the-fly. TruPax does not require TrueCrypt to be installed nor administrative rights. GUI and command line versions are available. The original material can be securely erased after a volume has been created. Volumes created by TruPax can also be extracted and all TrueCrypt volumes can be quickly invalidated.