TorrentGrab is a script that searches isoHunt for specific keywords, parse results using regular expressions, and then downloads episode numbers not located in saved list. It's not too user friendly. Although configuration is straightforward, it still requires you to know regular expressions.
OpenClass is a simple solution for class control. It provides multicast screen projection (sending the teacher's screen to all of the students), student attention requests (blocking student activities and asking them to look at teacher), viewing of all student screens at once, direct messaging to students, file and URL sharing, computer shutdown, access control for specific classes, and support for multi-seat configurations and multiple clients per machine. For students it provides automatic teacher discovery via broadcast, "raise hand" functionality, and automatic handling of network saturation and disconnection events.
DUST (Driver UpdateS Tool) is designed to "just work" for building kernel driver modules. The concept is similar to DKMS, though this has the benefit of being simpler, easier to test and use, and easier to integrate. DUST enables you to package up a driver pack, install it into the dust directory, and prepare for upgrading. Each driver pack has 3 components: an install file (populates a tree with stuff needed to build a working driver); the driver payload (tarball, zip file, etc.); and the update script, which will do nothing but copy the old driver kernel modules to a backup directory, build/install a new copy of the driver kernel, run depmod if needed, and mkinitramfs, mkinitrd, or dracut if needed. The install file is very trivial. It is easy to recode this as an RPM or deb. As long as it moves the driver payload and update script to the right location, you can use any mechanism to do this.
tpe-lkm is a Linux kernel module implementing Trusted Path Execution, a security feature that denies users from executing programs that are not owned by root, or are writable. This closes the door on a whole category of exploits where a malicious user tries to execute his or her own code to hack the system. Since the module doesn't use any kind of ACLs, it works out of the box with no configuration. It isn't complicated to test or deploy to current production systems. The module also has a few other grsecurity-inspired features implemented as "extras".