Elite Index and Concordance Creator automatically generates an index for PDF documents. Such an index can be imported by Indesign, MS Word, and other authoring programs as the index or concordance of a document. This is a quick and easy way of generating an index or concordance for books, manuals, transcripts, white papers, legal briefs, catalogs, articles, dissertations, and references.
TestNetwork is a commercial version of TestMaker that provides a distributed test environment for scalability and performance tests and service monitoring. TestNetwork runs TestMaker intelligent test agents on multiple machines to achieve virtual user levels not possible with TestMaker. It makes it easy to configure a rack of servers to create 10,000 to 100,000 virutal users. It also makes it easy to set up a group of servers distributed around your network to show how your Web-enabled application, including Web Service, is performing.
Palm and Pocket PC Movie List is a database add-on for the DEPReader PDA application. It provides an extensive list of and data on the most popular movies and names from the world of movies. It makes it easy to browse through more than 31,000 entries on the most popular movies, actors, actresses, directors, producers, writers, and movie characters. A single tap is enough to display all the movies in which an actor is starring or find all the people involved in a movie.
tk92 is multi-platform software for configuring Radio Shack PRO-92 and PRO-2067 scanner radios. It lets you read a memory image from the receiver or an SPG file, view and change settings using a graphical interface, and sort memory channels by frequency or by label. Users can import and export memory channel and talk group data from CSV files. tk92 can then write the image from the computer back to the radio.
Galet is a peer-to-peer application which primarily aims to provide easy-to-setup, secure communication channels between the computers of people who know and trust each other. Its secondary goal is to create a public network based on these channels. No direct connections occur between two nodes that have not been explicitly accepted by the users of these nodes. This makes the network very difficult to censor, as an attacker's direct access to the network is limited.