Suggested Categories:

Terminal Emulators
Terminal emulators are software programs that replicate the functionality of a traditional terminal or command-line interface (CLI) within a graphical environment. These tools allow users to interact with their computer's operating system using text-based commands, offering access to system functions, file management, and programming tasks. Terminal emulators are commonly used by developers, system administrators, and power users for running scripts, managing servers, or debugging applications. They often support features such as tabbed windows, color schemes, customizable key bindings, and integration with remote systems through protocols like SSH. By providing a flexible and efficient way to work with the command line, terminal emulators enhance productivity in both local and remote computing environments.
Kiosk Software
Kiosk software is software designed to run on self-service kiosks, allowing users to interact with a digital interface for tasks like information retrieval, ordering, or payment. It often features a touch-based user interface that is intuitive and easy to navigate. Kiosk software can be customized to suit various industries, including retail, hospitality, transportation, and healthcare. It typically includes security features to prevent unauthorized access and protect sensitive data. Additionally, kiosk software is often designed for remote management, enabling businesses to monitor and update their kiosk systems efficiently.
Package Managers
Package managers are software tools that automate the process of installing, upgrading, configuring, and removing software packages. They simplify dependency management by ensuring that required libraries and modules are downloaded and updated correctly. Many package managers connect to online repositories, allowing developers and system administrators to access large ecosystems of software quickly. By standardizing installations and updates, they reduce errors, improve consistency, and save time in both development and production environments. Package managers are widely used across programming languages, operating systems, and frameworks to streamline software distribution and maintenance.
IoT Operating Systems
IoT operating systems (OS) are specialized software platforms designed to run on Internet of Things (IoT) devices, providing the necessary functionality for resource management, communication, and real-time processing. These operating systems are optimized for low power consumption, small memory footprints, and efficient processing, allowing IoT devices to operate in environments with limited resources. IoT operating systems typically offer features like device control, sensor management, connectivity protocols, and security to ensure that IoT devices perform reliably and securely. They are used in a variety of IoT applications, such as smart home devices, wearables, industrial machinery, and automotive systems.
Hosting Control Panels
Hosting control panels, also known as site management and web hosting control panels, are software tools that enable IT professionals to manage their website, servers, and hosting packages. Hosting control panels simplify the process of managing domains, email accounts, installing website and server applications, and more.
Firewall Software
Firewall software is a security tool that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Acting as a barrier between a trusted internal network and untrusted external networks, firewalls help prevent unauthorized access and protect against cyber threats. They work by analyzing data packets and determining whether they should be allowed through based on set policies, blocking potentially harmful traffic. Modern firewalls often incorporate advanced features like intrusion prevention, application filtering, and deep packet inspection to strengthen security further. By providing this critical layer of protection, firewall software safeguards sensitive data and ensures the integrity of networked systems.
Configuration Management Software
Configuration management software is used to track and manage the configuration of systems, networks, and software throughout their lifecycle. It allows teams to automate the process of setting up and maintaining consistent configurations across multiple environments, reducing human error and ensuring standardization. This software helps monitor changes, providing version control and audit trails to maintain system integrity and compliance. It is especially useful in complex IT infrastructures, enabling teams to deploy, update, and scale systems efficiently. Configuration management software ultimately improves system reliability, reduces downtime, and facilitates collaboration among development and operations teams.
Telephony Software
Telephony software is a type of communication technology that enables voice and video communication over telephone systems, computers, and the internet. These platforms are designed to manage, route, and track phone calls, messages, and multimedia communications within businesses or personal environments. Features of telephony software often include VoIP (Voice over Internet Protocol) support, call routing, interactive voice response (IVR), voicemail, call recording, and integration with customer relationship management (CRM) systems. Many telephony systems also include analytics tools for tracking call volumes, durations, and customer interactions. By improving communication efficiency and providing scalable solutions, telephony software is crucial for businesses looking to streamline their communication infrastructure.
Virtualization Software
Virtualization software enables the creation and management of virtual machines (VMs) that emulate physical computers. By abstracting the underlying hardware, it allows multiple operating systems to run on a single physical machine, improving resource utilization and flexibility. Virtualization provides an isolated environment for applications, increasing security and stability by preventing conflicts between different software systems. It also simplifies the management of IT infrastructure, as virtual machines can be easily created, cloned, and moved between different hosts. This technology is crucial for businesses looking to scale their operations, optimize resource usage, and improve disaster recovery processes.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
  • 1
    Thincast Client
    Thincast Client turns your computer into a fully-featured Remote Desktop Protocol (RDP) Client, making it easy to connect remotely to your company's infrastructure. Using the Remote Desktop (RD) WebAccess Client you gain easy access to and control of published virtual machines (with Thincast Workstation), desktop sessions and applications. RD WebServices allows you to manage your virtual infrastructure remotely. You can access, start and stop the virtual machines on your host from anywhere....
  • 2
    uKnowva

    uKnowva

    Convergence IT Services

    uKnowva HRMS is a cloud-based, AI-enabled, and mobile-friendly human resource management platform that simplifies and automates everyday HR activities. It offers a single digital workspace covering recruitment, onboarding, payroll, performance reviews, and employee engagement for organizations of all sizes. The platform features a social intranet for collaboration, automated payroll, performance management, and tools to manage leaves, attendance, timesheets, and projects with transparency....
    Starting Price: $1.32/Month/User
  • 3
    DNS.WATCH

    DNS.WATCH

    DNS.WATCH

    Optimized for maximum speed, you will not feel any delays when browsing the web. We believe that everyone should have access to an uncensored resolver free of charge. Our resolvers only deliver uncensored records. DNS.WATCH believes in freedom. We are operating the following DNS resolvers. All our resolvers can be used free of charge. The resolvers are alive since 2014 and the project remains maintained. Our stats are fetched from our resolvers every few minutes. This reflects the sum of...
    Starting Price: Free
  • 4
    Yandex DNS
    Yandex has over 80 DNS servers located in different cities and countries. Each user's queries are processed by the server closest to him/her, that's why sites open faster with Yandex DNS in "basic" mode. Some websites on the internet contain malware that is capable of infecting your computer with a virus. Sometimes viruses can be located even on a checked site. Other pages are created by hackers and steal passwords and personal information or take money from telephone accounts. When...
    Starting Price: Free
  • 5
    Ottomatik

    Ottomatik

    Ottomatik

    Protection against anything that can go wrong. Data centerfires, accidental bad database queries, malicious hackers & more. We get it, accidental drop queries happen. It takes just 2 minutes to undo your mistakes and restore your database whenever you need. Focus on building your software and let us worry about your information storage through automated database backups. Save time with an easy setup that involves copying + pasting a command-line installation to get set up in under 2 minutes....
    Starting Price: $14 per month
  • 6
    PhotoRec

    PhotoRec

    CGSecurity

    PhotoRec is file data recovery software designed to recover lost files including video, documents and archives from hard disks, CD-ROMs, and lost pictures (thus the Photo Recovery name) from digital camera memory. PhotoRec ignores the file system and goes after the underlying data, so it will still work even if your media's file system has been severely damaged or reformatted. For more safety, PhotoRec uses read-only access to handle the drive or memory card you are about to recover lost...
    Starting Price: Free
  • 7
    Duplicacy

    Duplicacy

    Duplicacy

    A new generation cross-platform cloud backup tool. Duplicacy backs up your files to many cloud storages with client-side encryption and the highest level of deduplication. Duplicacy is built on top of a new idea called lock-free deduplication, which works by relying on the basic file system API to manage deduplicated chunks without using any locks. A two-step fossil collection algorithm is devised to solve the fundamental problem of deleting unreferenced chunks under the lock-free condition,...
    Starting Price: $20 per year
  • 8
    Hyper Backup
    Back up folders, system settings, and software packages from your Synology NAS to a wide range of destinations, while saving space with compression and deduplication. Back up your NAS data to a local shared folder, external devices, another Synology NAS, rsync servers, and public cloud services like Google Drive, S3-compatible storage, and Synology's C2 Storage for Individuals and C2 Storage for Businesses. Keep your backup plans as simple as possible with powerful customization features in...
  • 9
    Rclone

    Rclone

    Rclone

    Rclone is a command-line program to manage files on cloud storage. It is a feature-rich alternative to cloud vendors' web storage interfaces. Over 40 cloud storage products support rclone including S3 object stores, business & consumer file storage services, as well as standard transfer protocols. Rclone has powerful cloud equivalents to the Unix commands rsync, cp, mv, mount, ls, ncdu, tree, rm, and cat. Rclone's familiar syntax includes shell pipeline support, and --dry-run protection. It...
    Starting Price: Free
  • 10
    UrBackup

    UrBackup

    UrBackup

    UrBackup is an easy to set up Open Source client/server backup system, that through a combination of image and file backups accomplishes both data safety and a fast restoration time. File and image backups are made while the system is running without interrupting current processes. UrBackup also continuously watches folders you want to be backed up in order to quickly find differences from previous backups. Because of that, incremental file backups are really fast. Your files can be restored...
    Starting Price: Free
  • 11
    GigaCloud

    GigaCloud

    Gigasoft

    A simple ‘Cloud’ storage accounts for schools and businesses alike that need to backup data securely off-site with a limited budget. This type of account is priced competitively to attract clients that do not require a heightened service level or have had their budgets reduced. GigaCloud provides a professional backup service at a fraction of the cost. Bulk data seeding is free of charge and disaster recovery bulk restoration is available if required. A minimum 1-year contract is required...
  • 12
    PrimaryIO

    PrimaryIO

    PrimaryIO

    PrimaryIO’s HDM technology decouples compute and storage to seamlessly move workloads to and from the cloud rapidly and lets you fully control data. HDM provides workload mobility and data control with a combination of innovative technologies, cloud cache, cloud storage gateway, and an integrated smart IO analyzer. A smart IO analyzer transparently monitors virtual machine-to-datastore access patterns to identify frequently accessed data (hot set) and provide recommendations. HDM storage...
  • 13
    Vivaldi Mail

    Vivaldi Mail

    Vivaldi Technologies

    A powerful email client built right into your browser. Vivaldi Mail makes it easy to manage emails from multiple accounts, mailing lists and feeds in a unified inbox. A database of all your messages, labels, filters, searches is maintained by Vivaldi and the bedrock of our powerful email client. Mail from all of your accounts is indexed, so it’s searchable offline. Having a mail client built into your browser just makes sense. Compose messages in new tabs, keep multiple messages open and...
    Starting Price: Free
  • 14
    Gloo Mesh

    Gloo Mesh

    Solo.io

    Today's Kubernetes environments need help in scaling, securing and observing modern cloud-native applications. Gloo Mesh, based on the industry's leading Istio service mesh, simplifies multi-cloud and multi-cluster management of service mesh for containers and virtual machines. Gloo Mesh helps platform engineering teams to reduce costs, reduce risks, and improve application agility. Gloo Mesh is a modular component of Gloo Platform. The service mesh allows for application-aware...
  • 15
    AspenPLUS

    AspenPLUS

    AspenPLUS

    Built with our customers in mind, to save you time and money, aspenPLUS is the easiest way to manage your IT procurement online with the added benefit of having a dedicated account manager. 24/7 stock availability and pricing with thousands of products from the world’s biggest technology brands and exclusive pricing, all in one easy-to-use portal. Bespoke and pre-approved product bundles to suit your business, reducing errors and processing time. Save time and reduce errors, use our...
  • 16
    MotioCI

    MotioCI

    Motio

    MotioCI provides Cognos authors and administrators with new capabilities including faster upgrades, change management & version control, faster deployments, automated testing, and improved cleanup. Cognos Analytics gets even better with each release, but without MotioCI, upgrades can consume weeks of preparation and testing. We simplify your Cognos upgrade so you can enjoy the benefits without the anxiety and loss of time. Your team can quickly and easily, identify and safely delete the...
    Starting Price: Free
  • 17
    Bleemeo

    Bleemeo

    Bleemeo

    Bleemeo is a Cloud Monitoring Platform that allows DevOps and IT teams to monitor their infrastructure from the servers to the applications. It only takes 30 seconds to get a complete live picture of your infrastructure. Our agent discovers services and creates checks and metrics. Dashboards and notification rules for servers and services are automatically created. Android and iOS applications are available. Kubernetes, containers, and elastic infrastructures are fully supported. Deploying a...
    Starting Price: €4.99 per month
  • 18
    ZoogVPN

    ZoogVPN

    ZoogVPN

    ZoogVPN is the complete and trusted all-in-one VPN service that protects your sensitive personal and financial information online by using a highly encrypted VPN tunnel. This VPN complies with the latest security standards, so you can surf the web privately and securely. ZoogVPN apps are equipped with the fastest and most trusted VPN protocols - Ikev2 and OpenVPN. Both protocols are time-tested and have never been compromised. It ensures your data is safe and internet speed is high enough....
    Starting Price: $1.87 per month
  • 19
    Robot Schedule
    Every data center manager wants their IT team to be efficient, meet service-level agreements, and avoid processing errors. Automated job scheduling and batch job management free you and your operators to be more productive. And Robot Schedule is the starting point for any automation project requiring IBM i. Robot Schedule’s workload automation capabilities allow users to automate everything from simple jobs to complex, event-driven processes on multiple platforms and centralize management...
  • 20
    BatchMan

    BatchMan

    HONICO Systems

    BatchMan is a Workload Automation and Job Scheduling software with market experience of more than 20 years. Automate and monitor your business processes for SAP and nonSAP from a single point of control: By swiftly processing any kind of background jobs and smoothly integrating with the SAP Standard system, BatchMan enables central, cross-system control and administration of your IT tasks and other processes, hybrid, on-premise or in the Cloud. Why BatchMan WLA? • Central planning,...
  • 21
    Vampire OS

    Vampire OS

    Vampire OS

    Vampire OS is the alternative to Windows and macOS designed to make your computer faster, more powerful, secure, and privacy-respecting. We believe privacy is a fundamental human right. That's why Vampire OS doesn't collect personal data, so advertisers and governments can't spy on your activity. Vampire OS is Open Source, so anyone can audit its source code to verify its privacy. Users can use hard disk or RAM so users can experience lightspeed with stunning animation. Vampire OS is comes...
  • 22
    Intel oneAPI HPC Toolkit
    High-performance computing (HPC) is at the core of AI, machine learning, and deep learning applications. The Intel® oneAPI HPC Toolkit (HPC Kit) delivers what developers need to build, analyze, optimize, and scale HPC applications with the latest techniques in vectorization, multithreading, multi-node parallelization, and memory optimization. This toolkit is an add-on to the Intel® oneAPI Base Toolkit, which is required for full functionality. It also includes access to the Intel®...
  • 23
    Xshell

    Xshell

    NetSarang

    Easily create, edit, and launch sessions with the session manager and inheritable session properties. A multitude of authentication methods, protocols, and algorithms to handle any situation. Xshell's Local Shell gives you access to vital tools directly within Xshell and supports custom aliases for commonly used commands. View a graphical list of the remote directory's files with upload and download capabilities. Customize your view with drag and drop and easily manage all tabs with the tab...
    Starting Price: $99 one-time payment
  • 24
    WinMagic MagicEndpoint
    As a leading developer of cybersecurity solutions for over 25 years, WinMagic has entered the passwordless secure authentication market in 2022 by releasing MagicEndpoint. Leveraging our pedigree and experience in protecting endpoints and data-at-rest, MagicEndpoint is referred to as the most secure authentication solution with the best possible user experience – no user action required! MagicEndpoint ensures that CISOs and cyber security professionals can easily implement passwordless...
  • 25
    AirVPN

    AirVPN

    AirVPN

    This impenetrable tunnel prevents criminal organizations, your ISP or even your government from spying on your communications. Perfect Forward Secrecy - Through Diffie-Hellman key exchange DHE. After the initial key negotiation, re-keying is performed every 60 minutes (this value can be lowered unilaterally by the client). Additional connection types, supported by every Air VPN server, for ISPs or countries disrupting OpenVPN, are OpenVPN over SSH, SSL or Tor. Make it impossible to identify...
    Starting Price: $2.08 per 3 days
  • 26
    DEX Insight

    DEX Insight

    DEX Insight

    The fastest, easiest, and most accurate way to understand the experience your teams have with their digital workplace. With DEX Insight’s application usage analytics, you'll see where your teams are spending their time to understand the tools that are and are not driving value for your business. Collect sentiment while employees use any internal or licensed software application to support data-driven decisions about the tools and applications in your tech stack. Simply install DEX Insight in...
    Starting Price: Free
  • 27
    Angry IP Scanner

    Angry IP Scanner

    Angry IP Scanner

    Angry IP scanner is a very fast IP address and port scanner. It can scan IP addresses in any range as well as any their ports. It is cross-platform and lightweight. Not requiring any installations, it can be freely copied and used anywhere. Angry IP scanner simply pings each IP address to check if it’s alive, then optionally it is resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended with plugins. It also has...
    Starting Price: Free
  • 28
    Retain Mobile Archiving
    Retain Mobile Archiving delivers secure, encrypted messaging and archiving for iOS and Android devices. Generate and consume data to meet regulatory and compliance requirements—regardless of who owns the device. Retain Mobile also features carrier-level archiving of text messages. This gives you oversight on mobile communication data for your iOS, Android, and other mobile devices on the mobile carrier network. This solution is ideal for environments with corporate-owned devices, BYOD, or a...
  • 29
    Workelevate

    Workelevate

    Progressive Infotech

    Workelevate is a DEX platform which supports end users for IT, HR and Field Ops related issues for enhanced employee experience. It seamlessly automates and deliver responses for IT Support queries with help of Self Servicing Conversational AI Chatbot, Self healing agent and fully equipped admin console. Our DEX platform is capable of integrating with ITSM's like Service now, BMC, Zoho desk, Symphony Summit and custom ITSM's. We can also integrate with HRMS such as, Darwin Box, Ramco, SAP...
  • 30
    Pyroscope

    Pyroscope

    Pyroscope

    Open source continuous profiling. Find and debug your most painful performance issues across code, infrastructure and CI/CD pipelines. Let you tag your data on the dimensions important for your organization. Allows you to store large volumes of high cardinality profiling data cheaply and efficiently. FlameQL enables custom queries to select and aggregate profiles quickly and efficiently for easy analysis. Analyze application performance profiles using our suite of profiling tools. Understand...
    Starting Price: Free