IceScrum is a J2EE application for using Scrum while keeping the spirit of a collaborative workspace. It also offers virtual boards with post-its for sprint backlog, product backlog, and others. The tool offers everything that is in Scrum: role management (Product Owner, ScrumMaster, Team member, and StakeHolder), product backlog management with advanced features for prioritizing stories, Scrum lifecycle including a roadmap view, release planning, sprint backlog as a task board facilitating the Scrum ceremonial management of impediments, and chart production such as burndown charts, velocity charts, and cumulative flow diagrams. It offers others agile practices like a roadmap, vision, user stories, acceptance tests associated with stories, user roles, and planning poker.
FontMapper is a font texture generator for game developers. It allows you to turn a font you have installed to a PNG texture of tightly packed glyphs, accompanied by a text file describing the glyphs' properties and texture coordinates. You can read these in a game to render fonts. FontMapper supports Unicode (although only the Basic Multilingual Plane, i.e. the 16-bit codepoints), and each glyph can have its own size, i.e. fonts are not necessarily monospaced. Currently, FontMapper is command-line only, although there might be a GUI frontend in the future.
TMake is a fast, lightweight, yet very powerful Build System. You can use TMake to build projects or create new ones. It supports C, C++, C#, Java, and Go compilers and over 100 different packages. It can perform C and C++ dependency checking. It is very fast. It uses for Lua for plain and simple build scripts. It has a GUI.
Soffid IAM offers a complete and integrated solution for controlling access to enterprise applications. It provides you with everything you need to obtain accurate information about who uses your systems, manage the whole user provisioning lifecycle, and bring users an enhanced experience by removing the need to enter credentials every time they access your business applications. It provides a single point of audit and control for assessing data security regulatory compliance.