Comet Backup - Fast, Secure Backup Software for MSPs
Fast, Secure Backup Software for Businesses and IT Providers
Comet is a flexible backup platform, giving you total control over your backup environment and storage destinations.
Learn More
Get full visibility and control over your tasks and projects with Wrike.
A cloud-based collaboration, work management, and project management software
Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
CSV Comparator is a tool for comparing files which contain CSV-Data.
CSV Comparator is a tool for comparing files which contain CSV-Data. It was created for performance engineers to be able to have a easy way to compare data from two testruns and be able to automate the comparing process of various files with scripts.
There is a command line tool as well as a user interface.
In case you need to compare .xml-Files you can convert them to .csv-Files with my other project CSV Transformer.
The advantages by using CSV as input and output are the...
Java tools for decoding and manipulating BER encoded ASN.1 Files
A simple Java ASN BER decoder and profiler
A tool for easy manipulation of BER encoded files.
An "awk" for ASN.1 BER (for Unix people) or maybe a "notepad" for ASN.1 BER (for Windows people).
Jberd (Java BER decoder) is a lightweight BER decoder and associated tools for interpreting and processing BER encoded ASN.1 files.
The following facilities are provided:
• JBerd Profiler.
Framework (scripts, configuration, code) to build free and public services around travel and leisure data. That project makes an extensive use of already existing data sources such as Geonames and dbPedia, and adds some glue around those (eg, links).
basE91 is an advanced method for encoding binary data as ASCII characters. It is similar to UUencode or base64, but is more efficient. The overhead produced by basE91 depends on the input data. It amounts at most to 23% and can range down to 14%.
Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.