Suggested Categories:

Contact Tracing Software
Contact tracing software helps public health organizations track and trace the spread of contagious diseases by identifying and notifying individuals who may have been exposed to an infected person. These platforms typically use GPS, Bluetooth, or other tracking technologies to monitor interactions between individuals and generate alerts when a potential exposure is detected. Contact tracing software often includes features for managing health data, privacy protection, and integration with health systems for reporting and further action. By using this software, organizations can enhance their ability to manage public health risks, reduce transmission, and support timely interventions.
Server Management Software
Server management software provides tools and utilities for managing, monitoring, and maintaining servers in a network environment. These solutions enable administrators to configure servers, track their performance, deploy updates, and troubleshoot issues. Server management software often includes features such as system health monitoring, automated patch management, remote access, and backup solutions. By streamlining administrative tasks and improving the efficiency of server operations, these tools help minimize downtime and ensure optimal performance. They are commonly used by IT professionals to manage both on-premises and cloud-based infrastructure.
Driver Update Software
Driver update software helps users automatically scan their computer’s hardware to ensure that the most up-to-date drivers are installed. These platforms can detect outdated, missing, or incompatible drivers and allow users to easily download and install the latest versions directly from the manufacturer’s database. By using driver update software, users can optimize system performance, prevent hardware malfunctions, and improve device compatibility. The software typically automates the process of scanning for driver updates and can be set to run on a schedule, ensuring that the system stays up to date with minimal effort. This helps reduce errors and enhances overall system efficiency.
Desktop Search Software
Desktop search software is a tool that indexes the contents of a user’s computer—such as files, documents, emails, images, and archives—to enable rapid and precise searching across various data types. By building an index, these tools allow for lightning-fast queries, often supporting filters by file type, date, and content keywords. They commonly offer features like content preview, search result management (e.g., tagging or bookmarking), and compatibility with multiple formats including PDFs, Office files, archives, and more. Desktop search tools improve productivity by reducing the manual effort needed to locate files, serving professionals, researchers, students, and everyday users alike. They are designed to provide accurate, fast, and organized results, often operating silently in the background while keeping the index updated in real time.
File Copy Software
File copy software is designed to transfer files and folders quickly, reliably, and often with enhanced functionality compared to standard operating system copy tools. It can handle large files, resume interrupted transfers, and manage batch operations more efficiently. Many solutions include error recovery, speed optimization, file verification, and filtering to copy only specific file types or updated versions. Advanced tools may support copying across local drives, network locations, and external storage devices with minimal downtime. This makes file copy software essential for IT administrators, content managers, and anyone handling large-scale or frequent file transfers.
Virtual Machine Software
Virtual machine software allows users to run multiple operating systems on a single physical computer by creating isolated, virtualized environments. Each virtual machine (VM) operates as a fully functional computer with its own CPU, memory, storage, and network resources, independent of the host system. This technology is widely used for software testing, development, running legacy applications, and server consolidation. Many VM solutions support snapshots, cloning, and resource management to optimize performance and recovery. By enabling flexibility, scalability, and cost savings, virtual machine software is a cornerstone of modern IT infrastructure and cloud computing.
Disk Imaging Software
Disk imaging software creates an exact copy of a computer's hard drive, including the operating system, applications, settings, and files. It is commonly used for system backups, disaster recovery, and deploying standardized configurations across multiple machines. By capturing a full snapshot of a disk, users can restore their system quickly in case of data loss, hardware failure, or malware attacks. Many disk imaging tools offer incremental backups, compression, and encryption for efficient storage and security. This software is essential for IT professionals, businesses, and individuals looking to safeguard their data and streamline system recovery.
File Compression Software
File compression software reduces the size of files or folders to save storage space and speed up transfers. It works by using algorithms to eliminate redundancy and efficiently encode data, often resulting in significantly smaller file sizes. These tools typically support multiple compression formats, such as ZIP, RAR, and 7z, and can also encrypt archives for added security. Many include features like batch compression, password protection, file splitting, and integration with cloud storage. File compression software is essential for sharing large files, archiving data, and improving storage efficiency on both personal and enterprise systems.
IT Security Software
IT security software is designed to protect information technology (IT) systems, networks, and data from cyber threats, such as malware, hacking, and unauthorized access. These tools provide various features such as antivirus protection, firewalls, encryption, intrusion detection and prevention systems, and vulnerability management to ensure the integrity, confidentiality, and availability of sensitive information. IT security software helps organizations detect, prevent, and respond to security incidents, mitigate risks, and ensure compliance with industry regulations. It is critical for businesses and individuals to safeguard against cyberattacks, data breaches, and other security vulnerabilities.
Blog Platforms
Blog platforms are software or online services that allow individuals and organizations to create, publish, and manage blog content without requiring extensive technical skills. They provide tools for writing, formatting, adding multimedia, and organizing posts into categories or tags. Many platforms include customizable themes, SEO optimization features, and analytics to track readership and engagement. Some are geared toward casual writers, while others offer robust content management capabilities for professional blogging and brand marketing. By simplifying the publishing process, blog platforms empower creators to share ideas, stories, and expertise with a global audience.
Download Managers
Download managers are software tools that optimize and organize the process of downloading files from the internet. They can accelerate download speeds by splitting files into segments and downloading them simultaneously from multiple sources. Many also include features like pause/resume, scheduling, batch downloading, and support for various protocols such as HTTP, FTP, and BitTorrent. Advanced download managers can integrate with browsers, automatically capture download links, and manage large file transfers efficiently. These tools are popular among users who frequently download large files, media content, or software packages and need reliability and speed.
Endpoint Protection Software
Endpoint protection software is a software platform that provides the solution to secure endpoints—such as laptops, desktops, smartphones, and tablets—against cyber threats and attacks. These platforms provide real-time monitoring and defense mechanisms to protect devices from malware, ransomware, phishing, and other types of threats. Endpoint protection software typically includes antivirus, anti-malware, firewall, encryption, and intrusion prevention features to prevent unauthorized access and ensure data security. It also allows for centralized management, enabling IT teams to enforce security policies, update software, and monitor the health of all devices in the network. By using endpoint protection software, organizations can safeguard their devices and networks from cyber risks while maintaining compliance with security standards.
Disk Repair Software
Disk repair software is designed to diagnose, fix, and restore issues affecting hard drives, SSDs, USB drives, and other storage media. It can detect bad sectors, repair corrupted file systems, and recover inaccessible or lost data. Many solutions also offer preventive features such as disk health monitoring, error checking, and optimization tools to extend drive lifespan. By repairing logical errors and restoring damaged partitions, these tools help prevent data loss and improve system performance. Disk repair software is essential for IT technicians, data recovery specialists, and everyday users who need to maintain reliable storage devices.
UCaaS Software
UCaaS (Unified Communications as a Service) providers deliver cloud-based platforms that integrate multiple communication channels—such as voice, video, messaging, and conferencing—into a single solution. These services enable businesses to streamline internal and external communication without relying on separate, siloed tools. UCaaS platforms typically offer scalability, remote accessibility, and integration with productivity software, making them ideal for hybrid and distributed teams.
PDF Readers
PDF readers are software applications that enable users to access, open, and read PDFs. PDF readers are essential tools for being able to open and read PDF files. Advanced PDF readers may also support form filling, digital signatures, and interactive features embedded in PDF documents. PDF readers are widely used in both personal and professional settings to view reports, manuals, eBooks, contracts, and other documents that need to preserve formatting across different devices and platforms.
Investor Relations Software
Investor relations software, also known as investor relationship management software, enables startups and companies to manage all aspects of their relationships with investors. Investor relations software streamlines the processes of communicating with investors in order to keep them up to date on developments, and finances, and maintain the relationship.
Defrag Software
Defrag software optimizes the arrangement of files on a hard disk drive (HDD) to improve read and write speeds. By reorganizing fragmented data into contiguous blocks, it reduces seek time and enhances overall system performance. Many modern defrag tools also include scheduling, SSD optimization modes, and disk health monitoring. While SSDs don’t require traditional defragmentation, defrag software can still perform trimming and optimization tasks for them. These tools are especially valuable for extending the life of HDDs, speeding up boot times, and improving file access efficiency.
Sandbox Software
Sandbox software enables IT professionals and developers to create a sandbox on their machine, or a virtual sandbox in the cloud, in order to isolate potentially dangerous programs and applications for testing and development.
Debugging Tools
Debugging tools, also known as debuggers, are software tools that enable web developers and software developers to debug their code and applications in order to improve the quality and security of the code and application.
Data Security Software
Data security software is designed to protect sensitive data from unauthorized access, theft, or corruption. It includes a variety of tools and features such as encryption, access control, data masking, and backup and recovery to ensure that data remains secure at rest, in transit, and during processing. These solutions help organizations comply with data protection regulations, such as GDPR and HIPAA, by safeguarding personal, financial, and business data. Data security software often integrates with other IT security systems to provide comprehensive protection against cyberattacks, insider threats, and data breaches, ensuring that critical information remains protected.
View more categories (20) for "ubuntu 10.04"
  • 1
    D2C

    D2C

    D2C

    ...Others can be easily added from the official Docker Hub or custom Docker image. The platform supports AWS, Google Cloud, DigitalOcean, Vultr, and UpCloud for now. You can also connect your own hosts with Ubuntu 18.04/20.04 or Debian 8/9. With D2C scaling and balancing becomes a game. It’s easy with the platform to build a balanced infrastructure, change database configuration, and resize hosts. With the latest apps management technologies like Docker and Ansible inside D2C, you can utilize a single-click deployment from your repository to a cloud server in minutes. ...
    Starting Price: $50.00/month/user
  • 2
    afl-unicorn

    afl-unicorn

    Battelle

    ...The test harness then emulates the target binary code, and if it detects that a crash or error occurred it throws a signal. AFL will do all its normal stuff, but it’s actually fuzzing the emulated target binary code. Only tested on Ubuntu 16.04 LTS, but it should work smoothly with any OS capable of running both AFL and Unicorn.
    Starting Price: Free
  • 3
    Codespace

    Codespace

    Codespace

    ...The code snippet manager you've been waiting for. Codespace v1.6.1 requires Windows 10 or later. You can now import SnippetsLab JSON files into Codespace. See all your exported snippets by choosing "my exported snippets" in the app menu.
    Starting Price: $12.99 one-time payment
  • 4
    Sphinx

    Sphinx

    Sphinx

    ...Searching via SphinxAPI is as simple as 3 lines of code, and querying via SphinxQL is even simpler, with search queries expressed in good old SQL. Sphinx indexes up to 10-15 MB of text per second per single CPU core, that is 60+ MB/sec per server (on a dedicated indexing machine).
  • 5
    Buildkite

    Buildkite

    Buildkite

    ...Your source code never leaves your infrastructure. You can install the agent using one of our packages and binaries for almost every platform and architecture, including Ubuntu, Debian, Mac, Windows, Docker, and more. The agent’s artifact and meta-data storage allows for share-nothing, state-free build jobs that can be easily distributed and scaled across any number of agents. Run as many build agents as you need (up to 10,000 connected per account), without breaking a sweat. The open-source Elastic CI Stack for AWS gives you an easy-to-maintain, elastically scaling CI stack in your own AWS account. ...
    Starting Price: $15 per user per month
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB
Gen AI apps are built with MongoDB Atlas
Atlas offers built-in vector search and global availability across 125+ regions. Start building AI apps faster, all in one place.
Try Free →