The AI-powered unified PSA-RMM platform for modern MSPs.
Trusted PSA-RMM partner of MSPs worldwide
SuperOps.ai is the only PSA-RMM platform powered by intelligent automation and thoughtfully crafted for the new-age MSP. The platform also helps MSPs manage their projects, clients, and IT documents from a single place.
Learn More
Get full visibility and control over your tasks and projects with Wrike.
A cloud-based collaboration, work management, and project management software
Wrike offers world-class features that empower cross-functional, distributed, or growing teams take their projects from the initial request stage all the way to tracking work progress and reporting results.
...Features:
- group notes and images in a tree structure (using folders)
- can work on any directory on your machine
- technically works like a file browser with inline text editing
- synchronizes with any WebDAV server (optionally using SSL/TLS)
- allows one-way and two-way synchronization
- allows to encrypt your files locally and remote using AES256
- multi language support
You can obtain the full sourcecode at:
https://crispy-cow.de/git/CrispySyncNote.git
Latest changes:
2.1.0: Updated for Java 9 and up
2.0.2: Added more UI translation, updated greek language (thanks to geogeo)
2.0.1: Bugfix: Sync state is now copied when duplicating workspace due to change in encryption settings
This is free Java desktop application to keep your note in safe from others using the Encrypting Decrypting symmetric key algorithm, it's easy to transfer your note form source to another in confidential manner.
jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
Butterfly XML Editor is an IDE built on top of a new real-time incremental XML parsing algorithm. The editor features syntax and error highlighting, incremental validation, code completion, XSLT pipelines, and side by side DOM and source viewing.
Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.