YourKit Java Profiler is a CPU and memory profiler that makes it easy to solve wide range of CPU- and memory-related performance problems. It features automatic leak detection, powerful tools for the analysis of memory distribution, an object heap browser, comprehensive memory tests as part of your JUnit testing process, extremely low profiling overhead, transparent deobfuscation support, and integration with Eclipse, JBuilder, IntelliJ IDEA, NetBeans, and JDeveloper IDEs.
The GRASP Project has created an algorithmic-level graphical representation for software called the Control Structure Diagram (CSD). The CSD was created to improve the comprehension efficiency of Ada source code and, as a result, improve software reliability and reduce software costs. Since its creation, the CSD has been expanded and adapted to include other languages. GRASP provides the capability to generate CSD's from Ada 95, C, C++, Java, and VHDL source code in both a reverse and forward engineering mode with a level of flexibility suitable for professional application. GRASP has been integrated with the GNU family of compilers for Ada (GNAT) and C (gcc), and Sun's javac compiler for Java. Use of GRASP is not restricted to these compilers, however. This has resulted in a comprehensive graphically-based development environment for these languages. The user may view, edit, print, and compile source code as CSDs with no discernible addition to storage or computational overhead.
P-Synch is a commercial password management toolkit which provides automated password synchronization, password strength enforcement, password self-reset by authenticated users, and streamlined password reset by helpdesk. P-Synch is available for both internal use as well as for Internet-based deployments in B2B and B2C applications.
C/BOOKS consists of nine easy-to-use, fully-integrated accounting software modules that provide tools for working with accounts receivable, accounts payable, general ledger, order entry, inventory control, payroll, fixed assets, job costing, and purchase orders. It features an interactive visually-driven system with a consistent user interface. Online help is available for every input to explain the function keys and fields on the screen. It can be customized to meet a company's needs with the C/BASE 4GL application generation system, with which you can change file structures, report formats/layouts, and data input screens. Also, new applications created with C/BASE 4GL or C code can be linked to C/BOOKS accounting modules.
Sawmill is a log analysis tool which can be used to analyze Web site traffic, proxy usage, ftp usage, and much more. Major features include a persistent database for long-term tracking of statistics, hierarchical data mining features, and many security features appropriate for use in a multi-user environment.
Image Alchemy has the ability to convert between over 90 different raster image formats (including all colorspace and compression variations of each format). Color management features include gamma correction, undercolour removal, seven high quality dithers, colorspace conversion, and palette manipulation. It also includes a Postscript interpreter.
XED is a text editor for XML document instances. It is designed to support hand-authoring of small-to-medium-sized XML documents, and is optimized for keyboard input. It works very hard to ensure that you cannot produce a badly-formed document. Although it does not validate, the results of offline validation can be accessed, and it does read DTDs and keep track of your document structure, and provides context-based accelerators to make element and attribute entry fast and easy.
OpenXAdES enables people to work with legally-binding digital signatures (primarily giving and verifying them). Legislation often defines a set of requirements that legal digital signature technologies and infrastructures must be compliant with, and OpenXAdES aims at meeting many, if not all, such requirements from different legislations.
CyberFusion is a system that provides secure file transfer across a LAN, a WAN, and the Internet. It offers encryption and security, reliability and guaranteed delivery, management and automation, audit and control. It offers cost-saving migration from competitor products such as Connect:Direct which is supported with useful tools. It may be used as part of a VPN, ERP, EAI, or ETL software solution for secure file transfers as well as in disaster recovery, data archive, and backup and restore operations.