SDB (show database) is a utility to manage a collection of tradeable live shows. It features a browseable list of shows, and the ability to compile special interest lists and import or export from/to various formats, including plain text, CSV, HTML, and PDF. XML files are used to store all data. Future goals include the implementation of some BitTorrent features, especially the creation of torrent files, and some network features to share information about a recorded show.
Blite is a lightweight blog application with a focus on simplicity and ease of use. It provides the essential features of a blog, including categories, archives, and comments. It can easily be themed by modifying a stylesheet and a few simple templates. Blite pages are fast-loading and validate as HTML 4.01. Comment spam is filtered to a spambox (by the use of blogspam.net), where it can be reviewed and deleted (or published). Blite requires PHP 5.3 (or later) with the sqlite extension, and the xmlrpc extension for comment spam filtering.
LilacServer is a Web developed in Java that employs Java NIO technology. It is fast and highly productive. It is also a template engine with its own language for creating templates and a framework with its own API. More features of interest: built-in support for databases via JDBC; integrated localization facilities; sophisticated caching capabilities; support of sessions, multi-part forms, and file uploads; support of third-party libraries; a Web-based management interface; and so on.
This class is meant to generate graphical percentage bars made with star icons. It can be used to present the results of poll systems on which the generated percentage bars represent relative values of each poll choice. The class comes in two versions: one for drawing large stars and another for small stars. Several presentation details may be configured, like the star colors and the number of stars to present for 100% bars. The class generates the star bar images in PNG format.
Galet is a peer-to-peer application which primarily aims to provide easy-to-setup, secure communication channels between the computers of people who know and trust each other. Its secondary goal is to create a public network based on these channels. No direct connections occur between two nodes that have not been explicitly accepted by the users of these nodes. This makes the network very difficult to censor, as an attacker's direct access to the network is limited.