PVM (Parallel Virtual Machine) is a portable message-passing programming system, designed to link separate host machines to form a ``virtual machine'' which is a single, manageable computing resource. The virtual machine can be composed of hosts of varying types, in physically remote locations. PVM applications can be composed of any number of separate processes, or components, written in a mixture of C, C++ and Fortran. The system is portable to a wide variety of architectures, including workstations, multiprocessors, supercomputers and PCs.
IRRToolSet is a set of policy analysis tools, written in C++. It's designed to run under UNIX, using Tcl/Tk for graphics. There are tools for generating router configuration files, displaying and checking routes, generating aggregations of networks, etc. This project was formerly known as the Routing Arbiter ToolSet (RAToolset), and was maintained by ISI.
The rlpr package makes it possible (or at the very least, easier) to print files on remote sites to your local printer. It includes BSD-compatible replacements for `lpr', `lpq', and `lprm', whose functionality is a superset of their BSD counterparts. In other words, with the rlpr package, you can do everything you could do with the BSD printing commands, and more. The programs are all smaller, cleaner, and more portable than their BSD equivalents, and supported on just about any POSIX.1 system.
rsync is a replacement for rcp (and scp) that has many more features. It uses the "rsync algorithm" which provides a very fast method for remote files into sync. It does this by sending just the differences in the files across the link, without requiring that both sets of files are present at one of the ends of the link beforehand.
Sharity mounts shares exported by Windows, Samba, and other SMB/CIFS servers in the file system of Unix computers. It implements Resource Browsing, which is similar to the Windows Network Neighborhood (Netbios Workgroups and Active Directory), NTLM, NTLMv2, and Kerberos authentication, Microsoft's Distributed File System (DFS), and manipulation of Access Control Lists (ACLs).