Archivist is a network device configuration archiving and versioning program. It uses Subversion as its revision control system. Its multithreaded design makes it quite fast and thus suitable for operation on large networks with thousands of network devices. It supports Cisco IOS, Cisco CatOS, Juniper JUNOS, and Brocade/Foundry MLX series, but it can be easily extended to support any SSH or telnet-based network device by creating your own config download and post-processing scripts.
Concurrency Kit provides a plethora of concurrency primitives and lock-less and lock-free data structures designed to aid in the design and implementation of high performance scalable concurrent systems. It was designed to minimize dependencies on operating system-specific interfaces, and most of the interface relies only on a strict subset of the standard library and more popular compiler extensions.
Opticks is similar to commercial tools like ERDAS IMAGINE, RemoteView, ENVI, or SOCET GXP. Unlike other competing tools, you can add capability to Opticks by creating extensions. It supports the following file formats: NITF 2.0/2.1, GeoTIFF, ENVI, ASPAM/PAR, CGM, DTED, Generic RAW, ESRI Shapefile, HDF5, AVI, MPEG, JPEG, GIF, PNG, and BMP. It can zoom, pan, or rotate spatially large datasets. It can quickly layer GIS features, annotations, results, and other information over your data to provide context. It has many image display controls such as colormap, histogram, transparency, etc. Support for datasets larger than four gigabytes. Analysts can quickly combine steps using graphical wizards. Support for processing data in its native interleave of BIP, BSQ, or BIL. Extensions can add new processing algorithms, file formats, visualizations of the data, or data types.
Tenable Nessus is a world-leader in active vulnerability scanners. It features high-speed discovery, configuration auditing, asset profiling, sensitive data discovery, and vulnerability analysis of your security posture. Nessus scanners may be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks. It is free of charge for personal use in a non-enterprise environment.