Arkeia Network Backup is designed for organizations that require fast, easy-to-use, and affordable data protection. It backs up critical data to disk, tape, and cloud storage. Arkeia protects all major virtual platforms including VMware, Hyper-V, XenServer, and more than 200 physical platforms including Windows, Mac OS X, Linux, Netware, most UNIX flavors, and BSDs. The company’s source-side Progressive Deduplication technology helps users realize better performance at a lower cost by reducing data volumes. Arkeia’s deduplication is crucial to accelerating replication of on-premise backups to private or public clouds.
Monetra is a scalable payment processing engine for Linux, Unix, and Windows. It is designed to handle credit, debit, gift, EBT, and check authorizations and is certified to support major clearing house protocols. Features include support for multiple modems, multiple merchant accounts, and multiple processors, all simultaneously -- as well as IP and SSL connectivity along side SQL database support. Designed in C, conforming to POSIX standards, and utilizing light weight processes (threads), this product is able to handle a large number of transactions with high speed and minimal CPU usage.
PEDSIM is a microscopic pedestrian crowd simulation system. The PEDSIM library allows you to use pedestrian dynamics in your own software. Based on pure C++/STL without additional packages, it runs on virtually every operating system. The PEDSIM Demo Application (Qt) gives you a quick overview of the capabilities, and is a starting point for your own experiments. PEDSIM is suitable for use in crowd simulations (e.g. indoor evacuation simulation, large scale outdoor simulations), where one is interested in output like pedestrian density or evacuation time. The quality of the individual agent's trajectory is high, PEDSIM can be used for creating massive pedestrian crowds in movies. Since libpedsim is easy to use and extend, it is a good starting point for science projects.
The CyaSSL embedded SSL library is a lightweight SSL library written in ANSI C and targeted for embedded and RTOS environments, primarily because of its small size, speed, and feature set. It is commonly used in standard operating environments and cloud services as well because of its royalty-free pricing and excellent cross platform support. CyaSSL supports industry standards up to the current TLS 1.2 and DTLS 1.2 levels, is up to 20 times smaller than OpenSSL, and offers progressive ciphers such as HC-128, RABBIT, and NTRU.
Range Software is software for finite element analysis (FEA) in engineering simulations. Its main features are support for Computational Fluid Dynamics (CFD), heat transfer and radiation, linear stress-strain, electro-statics, acoustics, ground water flow, shape optimization, 3D mesh generation, an intuitive GUI, and import and export functionality. The Range Software package contains several tools which helps the user to setup, solve, and analyze the engineering problem.
Yuri no Yume is a hentai romance game starring two young girls caught up in dark mysteries: Phoebe, sweet and innocent and strangely obedient, and Chelomnya, haunted by dreams that creep into the waking world. The story features original art by Papillon and soundtrack by Choronzon.
Zoom is a low-overhead graphical and command line profiler for Linux. Profiles are system-wide, precise down to the instruction level, and capture complete backtraces of C/C++/ObjC/Fortran/Assembly code. This lets you see exactly where time was spent, what code was running (user or kernel), and how that code was called. Drill down into a specific symbol, and Zoom shows source and assembly annotated with general and processor-specific tuning advice. It saves profiles as a single, self-contained session file that can be emailed or attached to bug reports. This lets you share what you find with colleagues or archive it for later review. Zoom also supports remote network profiling and scripting, making it ideal for embedded or server systems and automated workflows.
pHash is an implementation of various perceptual hashing algorithms. A perceptual hash is a fingerprint of a multimedia file derived from various features from its content. Unlike cryptographic hash functions that rely on the avalanche effect of small changes in input leading to drastic changes in the output, perceptual hashes are "close" to one another if the features are similar. Potential applications include copyright protection, similarity searches for media files, or even digital forensics.