Drowning in misplaced IT assets, compliance headaches, and shadow IT? Navigate to clarity with an intuitive IT Asset Management solution.
Experience crisp visibility, effortless control, and unshakable security – all while freeing up your budget with optimized software licenses.
The best part? It’s easy.
Learn More
Rev Your Digital Product Delivery Engine
Enterprise-grade platform designed to connect strategy, planning, and execution across digital product development and software delivery
Planview links your technology vision directly to teams' daily work, providing complete visibility and control over your digital product delivery ecosystem.
Emulator of the ancient 8 bit microprocessor SC/MP 2
...There are some demos in /etc. And have a look to the NIBL / TINY BASIC interpreter in the TINYBASIC folder, most of the code is over 40 years old.
Have fun,
Theo Heinrichs
A open source java card virtual machine implementation. And also some part of the VM code can be used as part of kinds of tools such as javacard bytecode disassembler.
Java Decompiler, Disassembler and Bytecode debugger. Decompiler supports Java 5 (e.g. generics, for-each loops etc). Debugger allows user to step through each bytecode and view program state. Contains Swing GUI.
Teams of all sizes and in various industries that want the best time tracking and employee monitoring solution.
It's easy with Hubstaff, a time-tracking and workforce management platform that automates almost every aspect of running or growing a business. Teams can track time to projects and to-dos using Hubstaff's desktop, web, or mobile applications. You'll be able to see how much time your team spends on different tasks, plus productivity metrics like activity rates and app usage through Hubstaff's online dashboard. Most of the available features are customizable on a per-user basis, so you can create the team management tool you need.
jbytecode is a Java bytecode disassembler/assembler written in Python. Dissasembly code is aligned with Java bytecodes in the class file so modification and re-assembly is always possible, even when class is obfuscated.