Platform Independent Petri Net Editor (PIPE) creates and analyses Petri Nets quickly, efficiently, and effectively. A key design feature is the modular approach adopted for analysis, enabling new modules to be written easily and powerfully, using built-in data layer methods for standard calculations. Six analysis modules are provided, including Invariant Analysis, State-Space Analysis (deadlock, etc.), and Simulation Analysis and Classification. PIPE adheres to the XML Petri net standard (PNML). The file format for saving and loading Petri Nets is extensible through the use of XSLT, the default being PNML.
OpenThinClient is a thin client solution consisting of a Linux-based operating system along with a comprehensive Java-based management GUI and server component. It is intended for environments where a medium to large number of thin clients must be supported and managed efficiently.
Phuzby will let you search your organisation's LDAP directory (such as Active Diretory, Novell eDirectory, or OpenLDAP) for the contact details of colleagues, customers, or suppliers. Phuzby can display a photo for each person, and can even read the telephone number out loud to help you dial it correctly. In fact, if your phone system supports TDMF tones, you can hold your handset near you PC's speaker and phuzby will dial the number for you.
System and Process Monitor in Java provides a JNI (Java Native Interface) implementation for monitoring global system resources and processes (outside JVM) via a unified (cross-platform) interface. The Java interface and all native libraries are compiled into a single JAR and are loaded transparently on any architecture upon request. It should be easy to embedd this code into your Java applications, either as a separate JAR or as one single application archive.
The goal of Escape-K is to provide an all-in-one platform for IT service management. This means that using a single application (the Escape-K client console), users are able to manage any sized computer organization, from workstation and printers to servers, databases, or network devices. Escape-K follows the main guidelines recommended by ITIL. Therefore, the core of the application is the composed of the CMDB. Depending of the chosen perspective, Escape-K users can deal with incidents and problem resolution as well as server or database administration.