Suggested Categories:

Terminal Emulators
Terminal emulators are software programs that replicate the functionality of a traditional terminal or command-line interface (CLI) within a graphical environment. These tools allow users to interact with their computer's operating system using text-based commands, offering access to system functions, file management, and programming tasks. Terminal emulators are commonly used by developers, system administrators, and power users for running scripts, managing servers, or debugging applications. They often support features such as tabbed windows, color schemes, customizable key bindings, and integration with remote systems through protocols like SSH. By providing a flexible and efficient way to work with the command line, terminal emulators enhance productivity in both local and remote computing environments.
Kiosk Software
Kiosk software is software designed to run on self-service kiosks, allowing users to interact with a digital interface for tasks like information retrieval, ordering, or payment. It often features a touch-based user interface that is intuitive and easy to navigate. Kiosk software can be customized to suit various industries, including retail, hospitality, transportation, and healthcare. It typically includes security features to prevent unauthorized access and protect sensitive data. Additionally, kiosk software is often designed for remote management, enabling businesses to monitor and update their kiosk systems efficiently.
Package Managers
Package managers are software tools that automate the process of installing, upgrading, configuring, and removing software packages. They simplify dependency management by ensuring that required libraries and modules are downloaded and updated correctly. Many package managers connect to online repositories, allowing developers and system administrators to access large ecosystems of software quickly. By standardizing installations and updates, they reduce errors, improve consistency, and save time in both development and production environments. Package managers are widely used across programming languages, operating systems, and frameworks to streamline software distribution and maintenance.
IoT Operating Systems
IoT operating systems (OS) are specialized software platforms designed to run on Internet of Things (IoT) devices, providing the necessary functionality for resource management, communication, and real-time processing. These operating systems are optimized for low power consumption, small memory footprints, and efficient processing, allowing IoT devices to operate in environments with limited resources. IoT operating systems typically offer features like device control, sensor management, connectivity protocols, and security to ensure that IoT devices perform reliably and securely. They are used in a variety of IoT applications, such as smart home devices, wearables, industrial machinery, and automotive systems.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
Virtualization Software
Virtualization software enables the creation and management of virtual machines (VMs) that emulate physical computers. By abstracting the underlying hardware, it allows multiple operating systems to run on a single physical machine, improving resource utilization and flexibility. Virtualization provides an isolated environment for applications, increasing security and stability by preventing conflicts between different software systems. It also simplifies the management of IT infrastructure, as virtual machines can be easily created, cloned, and moved between different hosts. This technology is crucial for businesses looking to scale their operations, optimize resource usage, and improve disaster recovery processes.
Telephony Software
Telephony software is a type of communication technology that enables voice and video communication over telephone systems, computers, and the internet. These platforms are designed to manage, route, and track phone calls, messages, and multimedia communications within businesses or personal environments. Features of telephony software often include VoIP (Voice over Internet Protocol) support, call routing, interactive voice response (IVR), voicemail, call recording, and integration with customer relationship management (CRM) systems. Many telephony systems also include analytics tools for tracking call volumes, durations, and customer interactions. By improving communication efficiency and providing scalable solutions, telephony software is crucial for businesses looking to streamline their communication infrastructure.
Firewall Software
Firewall software is a security tool that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between a trusted internal network and untrusted external networks, firewalls help prevent unauthorized access and protect against cyber threats. They work by analyzing data packets and determining whether they should be allowed through based on set policies, blocking potentially harmful traffic. Modern firewalls often incorporate advanced features like intrusion prevention, application filtering, and deep packet inspection to strengthen security further. By providing this critical layer of protection, firewall software safeguards sensitive data and ensures the integrity of networked systems.
Configuration Management Software
Configuration management software is used to track and manage the configuration of systems, networks, and software throughout their lifecycle. It allows teams to automate the process of setting up and maintaining consistent configurations across multiple environments, reducing human error and ensuring standardization. This software helps monitor changes, providing version control and audit trails to maintain system integrity and compliance. It is especially useful in complex IT infrastructures, enabling teams to deploy, update, and scale systems efficiently. Configuration management software ultimately improves system reliability, reduces downtime, and facilitates collaboration among development and operations teams.

1535 Products for "linux" with 1 filter applied:

  • 1
    Ubuntu Server
    Ubuntu Server brings economic and technical scalability to your datacentre, public or private. Whether you want to deploy an OpenStack cloud, a Kubernetes cluster or a 50,000-node render farm, Ubuntu Server delivers the best value scale-out performance available. It doesn’t matter whether you want to deploy a NoSQL database, web farm or cloud. Certified by leading hardware OEMs and with comprehensive deployment tools, so you can get the most from your infrastructure. Our regular release...
  • 2
    Ubuntu for Raspberry Pi
    When your invention turns into a product, the Raspberry Pi compute module is a hardened, industrial grade system-on-module that provides the brain for a range of hardware from robots to racks. Open source is the new normal for software innovation - from cloud to edge, containers to IoT, from AI/ML to robotics, from self-driving cars to nanosats, the biggest companies in the world are building on open source and making it better too. The Raspberry Pi is an ARM instruction set computer, just...
    Starting Price: $25 one-time payment
  • 3
    IBM AIX
    For over three decades, our customers have trusted AIX to run their most mission critical applications. As we enter a new era, AIX will continue to drive innovation with hybrid cloud and open source capabilities helping customers build and deploy modern applications in a secure and resilient environment. Enterprises need infrastructure that is secure, highly available and adaptable to meet changing business demands. AIX®️ on Power Systems delivers these capabilities and more, with the...
  • 4
    iMin OS

    iMin OS

    iMin Technology

    Settings and preferences menu immediately appears when the device is powered on. Configure settings quickly and conveniently. iMin UI is an operating system based on the in-depth optimisation of the android system, tailored for intelligent commercial equipment. It is optimised from interactive experience and actual application for best system performance. Launch private mode to prevent applications from running without the system navigation bar, and block other notifications. The user manual...
  • 5
    AdroitLogic Integration Platform Server (IPS)
    Easily deploy any number of ESB instances on the Integration Platform with just a few mouse clicks. Monitor and debug individual instances as well as entire clusters via a single dashboard. ESB instances are spawned in lightweight Docker containers, which provides better resource utilization and responsiveness than virtual machines. The platform detects and re-spawns failed instances within a matter of seconds, using the powerful Kubernetes framework. Adjust computing power of the platform...
  • 6
    Mobian

    Mobian

    Mobian

    Mobian aims to integrate the standard Debian distribution with the Phone Shell (phosh) project in a package that works on certain mobile phones, such as the Pinephone. Over time, the idea is to minimize the Mobian specific pieces by “upstreaming” customization to the original projects. Mobian comes with Phosh, the Phone Shell by Purism. It is based on well known modern Gnome technology like GTK, GSettings and DBus running on a wlroots based wayland compositor called phoc. Mobian aims to...
  • 7
    Tencent Cloud Virtual Machine
    ... applications. CVM supports multiple Linux distribution versions and Windows Server versions. You can access Tencent Cloud CVM as an administrator with full control. Using various tools such as the Tencent Cloud console and APIs, you can connect to your CVM instances and perform operations like restarting and modifying your network configurations.
  • 8
    Fleet

    Fleet

    Fleet Device Management

    Ask questions about your servers, and laptops. Whatever their operating system, wherever they live. Track and segment your enrolled hosts. Search by important details, and zoom in on individual targets. Collect and share useful information for ops teams, security teams, help desk, and more. Fleet is self-hosted and self-managed, and can be run within your own data centers or in the cloud. Write scripts with fleetctl and design scheduled queries to integrate alerts and dashboards across your...
    Starting Price: $4 per host per month
  • 9
    GNOME Terminal
    Terminal is a terminal emulator application for accessing a UNIX shell environment which can be used to run programs available on your system. Terminal supports escape sequences that control cursor position and colors. A terminal is a text input point in a computer that is also called the Command Line Interface (CLI). IBM 3270, VT100 and many others are hardware terminals that are no longer produced as physical devices. To emulate these terminals, there are terminal emulators. Any input...
  • 10
    KMail
    KMail is the email component of Kontact, the integrated personal information manager from KDE. Default settings rather compromise on features than security or privacy. End-to-end Encryption. Support for OpenPGP and S/MIME is built-in, and a setup and key generation wizard aids users in getting started with this. Transport encryption, SSL/TLS encrypted communication is of course supported, as are a number of authentication methods such as GSSAPI (Kerberos) or OAuth2. Strong isolation of HTML...
  • 11
    OpenText Extra!
    Our Windows-based emulator connects users to IBM, UNIX, and Linux host applications. Easy to use, manage, and highly secure, OpenText™ Extra! saves time by eliminating repetitive actions through keystroke and macro automation. OpenText Extra! is integrated with Microsoft Office, which enables user to eliminate keystrokes to save time. Complete repetitive actions faster and more accurately with various productivity features. Completely customize your software before deployment with the custom...
  • 12
    OpenText Reflection for the Web
    Configure sessions with hotspots, keyboard mapping, color settings, and more. Build web frameworks around mainframe applications. Centrally install and deploy for instant availability. Once you make updates, users automatically download the new version when they connect. Connect to any major GDS. Use the Airlines Printer component to generate tickets, baggage tags, and boarding passes. Connect to host systems, making IBM, UNIX, Unisys, OpenVMS, and HP data instantly available to browser...
  • 13
    Terminator

    Terminator

    Terminator

    Terminator Terminal Emulator is a powerful tool that allows users to manage multiple GNOME terminals within a single window. Originally developed in 2007 by Chris Jones as a compact Python script, it has evolved into a flexible terminal management application inspired by tools like Iterm2 and Tilix. Terminator lets users combine and rearrange terminal windows to suit their workflow, making it ideal for those who frequently work with multiple remote machines or command-line sessions. The...
    Starting Price: Free
  • 14
    OpenText Host Access for the Cloud
    Quickly deliver browser-based access from a central location – without the need to manage Java runtime environments. Make sure you know who is accessing your mainframe, and ensure that only authorized users get to the login screen. Leverage enterprise credentials to move from a potentially unsecure eight-character password, to a one-time pass ticket. Why reinvent the wheel? Provision terminal emulation like other corporate resources, through the corporate user directory. Quickly deploy...
  • 15
    FlexTerm

    FlexTerm

    FlexTerm

    FlexTerm is written entirely in C# .NET, providing a new user interface that is long overdue for the terminal emulation community. The user interface utilizes the modern ribbon command bar to organize the program's features into a series of tabs at the top of the window. This increases discover-ability of features and functions, enables quicker learning of the program, and makes users feel more in control of their experience with the program. The ribbon replaces both the traditional menu bar...
  • 16
    Guake Terminal

    Guake Terminal

    Guake Terminal

    Imagine you are working in your favorite text editor and want to execute some commands, like execute the unit test of your code, check a man page, or edit some configuration file. You can do it at lightning speed without leaving your keyboard. Just press your predefined "Show Guake" hotkey, execute your command, and repress it to hide the terminal and go back to your work. Guake supports Multimonitor setup. Open it on the monitor where your mouse is, or in a dedicated screen. Use Several...
    Starting Price: Free
  • 17
    Optergy

    Optergy

    Optergy

    Optergy is a technology company focused on providing complete building optimisation solutions that enable smart spaces to improve wellbeing, engagement, productivity and control. Creating simple technologies for more efficient and sustainable buildings, Optergy empowers you with the tools to be in total control of your buildings and transform the way people live, work and play. With a resource-efficient building and energy management system, you can easily achieve a high level of comfort...
  • 18
    LogMeIn Hamachi
    Create and manage virtual networks on-demand as you need them. Quickly and easily provision virtual network client software to new computers without having to go onsite. Run Hamachi in the background of networked computers so you always have access even when they’re unattended. Available with Standard, Premium and Multi-network subscriptions. Provide remote users with secure access to specific computers on your network from any location, without modifying firewalls or network routers....
    Starting Price: $49 per year
  • 19
    SCIOPTA

    SCIOPTA

    SCIOPTA

    The SCIOPTA architecture is specifically designed to provide excellent real-time performance and small size. Internal data structures, memory management, interprocess communication and time management are highly optimized. SCIOPTA is a pre-emptive real-time kernel. Interrupts can be serviced at any time, even inside the kernel. SCIOPTA is a message based real-time operating system. A powerful set of system calls is available to control the resources. Standardized processes and interprocess...
  • 20
    Zephyr

    Zephyr

    Zephyr

    From simple embedded environmental sensors and LED wearables to sophisticated embedded controllers, smart watches, and IoT wireless applications. Implements configurable architecture-specific stack-overflow protection, kernel object and device driver permission tracking, and thread isolation with thread-level memory protection on x86, ARC, and ARM architectures, userspace, and memory domains. For platforms without MMU/MPU and memory constrained devices, supports combining...
  • 21
    Contiki-NG

    Contiki-NG

    Contiki-NG

    Contiki-NG is an open-source, cross-platform operating system for Next-Generation IoT devices. It focuses on dependable (secure and reliable) low-power communication and standard protocols, such as IPv6/6LoWPAN, 6TiSCH, RPL, and CoAP. Contiki-NG comes with extensive documentation, tutorials, a roadmap, release cycle, and well-defined development flow for smooth integration of community contributions. Unless explicitly stated otherwise, Contiki-NG sources are distributed under the terms of...
    Starting Price: $4 per user per month
  • 22
    Micrium OS

    Micrium OS

    Silicon Labs

    At the heart of any embedded OS is a kernel, which provides vital task scheduling and multi-tasking services to ensure that the timing requirements of your application code can be met, even as you regularly update and expand that code with new features. Micrium OS is more than a kernel, though, providing a number of additional modules to help you meet your project’s needs. Micrium OS is provided entirely free of charge for deployment on Silicon Labs EFM32 and EFR32 devices! You can begin...
  • 23
    Mobius Labs

    Mobius Labs

    Mobius Labs

    We make it easy to add superhuman computer vision to your applications, devices and processes to give you unassailable competitive advantage. No code, customizable & on-premise AI solutions.
  • 24
    RPort

    RPort

    RPort

    Get full insights into your servers' cpu usage, memory utilization, disk fill levels, network bandwidth, processes, and more. Monitor internet based servers and their services like websites and email servers from different locations around the globe. Network monitoring of intranets, routers, switches, IP-cameras, printers, and other IP-devices behind a firewall. Stop spending more time configuring your monitoring solution than actually monitoring your network. CloudRadar's simple UX,...
    Starting Price: $1.50 per host per month
  • 25
    ADOIT

    ADOIT

    BOC Group

    ADOIT Enterprise Architecture suite is users' best-rated tool for deriving data-driven insights and architecture analysis, trusted by SMEs and large corporations worldwide. ADOIT helps you to make smart and fast decisions, manage digital portfolios, discover cross-functional dependencies and drive growth. ADOIT is intuitive, powerful, and flexible. It is the ultimate way to do EA. You can start building your digital twin already today, as the cloud-based ADOIT:Community Edition is available for free.
  • 26
    Bitmask

    Bitmask

    Bitmask

    The Bitmask application and its custom branded versions like RiseupVPN are lovingly hand-crafted by a team of paid and volunteer programmers from different countries. Development is principally sponsored by the LEAP Encryption Access Project, an non-profit organization dedicated to defending democracy by protecting the right to whisper. The Bitmask application is designed to have a friendly interface with automatic configuration. You simply start the application, register with the compatible...
  • 27
    Mailpile

    Mailpile

    Mailpile

    Mailpile is an effort to reclaim private communication on the Internet. A project to rescue our personal lives from the proprietary cloud and prevent our conversations from being strip-mined for corporate profit and government surveillance. Mailpile is taking e-mail back. Powerful search & tagging makes your pile of mail managable, whether you have just a few messages, thousands or even millions. Mailpile is designed to be fast and responsive, outperforming "the cloud" even on slow...
  • 28
    SOGo

    SOGo

    SOGo

    SOGo is a fully supported and trusted groupware server with a focus on scalability and open standards. SOGo is released under the GNU GPL/LGPL v2 and above. SOGo provides a rich AJAX-based Web interface and supports multiple native clients through the use of standard protocols such as CalDAV, CardDAV and GroupDAV, as well as Microsoft ActiveSync. SOGo is the missing component of your infrastructure; it sits in the middle of your servers to offer your users a uniform and complete interface to...
  • 29
    SquirrelMail

    SquirrelMail

    SquirrelMail

    SquirrelMail is a standards-based webmail package written in PHP. It includes built-in pure PHP support for the IMAP and SMTP protocols, and all pages render in pure HTML 4.0 (with no JavaScript required) for maximum compatibility across browsers. It has very few requirements and is very easy to configure and install. SquirrelMail has all the functionality you would want from an email client, including strong MIME support, address books, and folder manipulation. The need arose in our...
  • 30
    Mirantis Secure Registry
    Mirantis Secure Registry (formerly Docker Trusted Registry) provides an enterprise grade container registry solution that can be easily integrated to provide the core of an effective secure software supply chain. Enterprise-grade security Centralize control for container images: Store, share, and manage images from a secure docker registry under your control, enabling developers to use and run only approved images. Protect and verify: Scan images against a continuously updated...