Zorka is a sophisticated programmable profiling/monitoring agent for Java suitable for running with production applications. The agent integrates seamlessly with popular monitoring systems and protocols (Zabbix, Nagios, syslog, SNMP) and offers additional tracing/profiling capabilities that - along with the accompanying data collector - help with spotting performance issues and general problems. The agent also exposes JMX data to conventional monitoring systems. Platforms (more or less) supported out of the box include: JBoss 4/5/6/7, Wildfly 8, Tomcat 6/7/8, Jetty 6/7/8/9, Websphere, Weblogic, GlassFish 4.0, WSO2 ESB, Mule ESB, and Jasig CAS. There is also dedicated support for the popular Java libraries Spring, Quartz, CXF, and Axis 1.x. The agent should run on most other platforms with limited functionalities (that is, lack of support for platform-specific features). It works with JDK6, JDK7, and JDK8. JDK5 support is also possible after preprocessing the agent binary with retrotranslator. Functionality can be easily added by implementing simple BSH scripts.
LogicalDOC is a Web-based document management system that is easy to use and learn. Its architecture leverages best-of-breed Java technology to achieve a powerful and flexible solution. It supports its users with a powerful search engine (Lucene), Web service interface (JAX-WS via CXF) compatible with .NET and PHP, versioning, annotation on documents, a WebDAV interface, importing and exporting from .zip files. Documents can be organized into hierarchical folders, searched using the integrated search engine, or browsed by Tag. The system is extensible thanks to the technologies used (Spring-Hibernate) and its plugin architecture.
Magnolia is a CMS which delivers smartphone simplicity on an enterprise scale. The mobile-inspired HTML5 user interface works through customisable, task-focused Apps, a notification stream called the Pulse, and a system of Favorites for quickly accessing the workspace. Magnolia allows organizations to orchestrate online services, sales, and marketing across all digital channels, maximizing the impact of every touchpoint. Magnolia’s Open Source technology, support of open standards such as CMIS and JCR, and integration with the Spring Framework enable developers to unlock backend systems and third-party applications. Magnolia is used in more than 100 countries across the world by governments and leading FORTUNE 500 enterprises.
Although widely used, currently popular peer-to-peer (P2P) applications offer no user privacy. By design, services like BitTorrent and Gnutella share data with anyone that asks for it, allowing a third-party to systematically monitor user behavior. As a result, using a P2P network means that your online activities become public knowledge. OneSwarm is a peer-to-peer tool that provides users with explicit control over their privacy by letting them determine how data is shared. Instead of sharing data indiscriminately, data shared with OneSwarm can be made public, shared with friends, shared with some friends but not others, and so forth.
Quest Identity Manager for Unix lets you remotely manage local users and groups on Unix, Linux, and Mac systems. It lets you find and manage existing local Unix users and groups throughout your environment through a single, centralized management console. You can create new local Unix users and groups throughout your environment from the same centralized management console. Local Unix user and group information can be securely managed over SSH. The management console can be run from Unix, Linux, Windows, or Mac platforms and any of the most common Web browsers. Quest Identity Manager for Unix can provide granular reports on Unix identity information, including local Unix users, local user conflicts, and all members of specific Unix groups. It can uncover rogue or unused local accounts.
Algorithm Study provides tools and resources to augment the traditional study of algorithms. It includes implementations of common and less-common algorithms in a variety of languages and visualization tools to help in gaining a deeper understanding of the algorithms. The algorithm implementations are each accompanied by a discussion of the asymptotic ("big O") run time and memory limits of the algorithm. Some implementations include discussion of how the algorithm or data structure is commonly used and comparisons with similar algorithms or data structures. All implementations have test cases that exercise their functionality. The visualization tool, Algorithm Visualizer, displays what happens as various algorithms do their work.