DB2 is a database management system that offers industry leading performance, scalability, and reliability on your choice of platform from Linux to z/OS. Its Web Control Center offers administrators an easy-to-use interface for maintaining databases, and can be run from any Java-enabled Web browser. For Java developers, DB2 UDB for Linux offers support for JDBC and SQLJ, and Net.Data allows for the creation of dynamic data diven Web applications. DB2 UDB for Linux allows you to harness the power of user-defined types and functions and support for Binary Large Objects.
HashCatalog is a program that can find duplicate files in one or more folders or between two lists of one or more folders. HashCatalog supports a regular expression mask to select files to be evaluated for duplicates. HashCatalog will always recurse directories in search of files. HashCatalog can also create an XML file containing a listing of files, along with enough information to be able to determine duplicates. This XML file can be used to allow searches for duplicates against removable media. The catalog can be supplied to the list of search locations, along with individual files and folders. The hash methods supported are: MD5, SHA, SHA1, SHA256, SHA384, and SHA512.
DatabaseToUML reverse engineers a database schema from an existing relational JDBC database. Tables and fields are reversed to classes and attributes, constraints are reversed to association, and tables composed only of foreign keys are converted to many-to-many associations. The main idea is to reuse the reversed model in a generator, taking UML2.x (EMF XMI 2.0/2.1) models as input.
BEAM is a toolbox and development platform for viewing, analysing, and processing of remote sensing raster data. Originally developed to facilitate the utilisation of image data from Envisat's optical instruments, BEAM now supports a growing number of other raster data formats such as GeoTIFF and NetCDF as well as data formats of other EO sensors such as MODIS, AVHRR, AVNIR, PRISM and CHRIS/Proba. Various data and algorithms are supported by dedicated extension plug-ins. It includes VISAT, an intuitive desktop application, a set of scientific tools running either from the command line or invoked by VISAT, and a rich Java API for the development of new remote sensing applications and BEAM extension plug-ins.
Bad Peggy searches for damaged JPEG files and validates and verifies pictures for truncation and other blemishes, which sometimes occur when such files are downloaded or restored from bad backups. It's fast, easy to use, and reliable in the analysis it does. It uses all available CPU cores too.
Assimilate is a Maven2 plugin that allows developers to import dependencies from other pre-built Maven projects without a formal parent-child hierarchy existing between the projects. There is no limit to the number of project dependencies. Maven 2.0.9's "import" scope acts not on managed dependencies, but on those declared in the dependency management section of the imported pom file. Assimilate, in contrast, is designed to act on managed dependencies of any prebuilt Maven project (stored in the local repository), as though they were declared in the local project's managed dependency section.
jSmaTeP assists in the use of Java for processing import and export data by configuring a data structure rather than by programming it. The structure of the import data is specified in an XML file. jSmaTeP then generates a value object representing exactly one row or record in the import file based on a given XML data configuration. This means that if the import or export format changes, only the XML data configuration needs to be changed to match it.
Golden Rules Organizer is a well-structured personal organizer and goal system. It supports three planning levels: mission and values, projects, recurring and one-time activities. It includes a planner facility, and provides diary, time tracking, contact management, and hierarchical notes on any subject. Data can be extracted to spreadsheets, printed, reported, exported, and imported. It provides backup and recovery facilities. It is designed for professionals, and is suitable to novices.
JRainbow is a program that generates Rainbow tables for the MD5 and SHA-1 hash algorithms. These tables then can be used for a Rainbow attack to retrieve hashed passwords. Up to 8 digit password rainbow tables are supported. The tables use a textual format. Six variations of alphanumeric and special character sets are supported. You can choose how many times to hash the input before storing it in the table.