Other Useful Business Software
Convert CentOS to Red Hat Enterprise Linux on Azure Icon
Convert CentOS to Red Hat Enterprise Linux on Azure

Go beyond legacy Linux and streamline your CentOS migration journey by moving mission-critical workloads to Red Hat Enterprise Linux on Azure.

CentOS Linux is experiencing End of Life on June 30th, leading to potential gaps in security. With Red Hat Enterprise Linux on Azure, IT Teams can seamlessly migrate mission-critical CentOS Linux workloads knowing they don’t have to compromise on security, scalability, reliability, and simplifying cloud management. Securely accelerate innovation and unlock a competitive edge with enterprise-grade modern cloud infrastructure.
Vivantio IT Service Management Icon
Vivantio IT Service Management

Your service operation isn’t one-size-fits all, so your IT service management solution shouldn’t be either

The Vivantio Platform allows you to focus on the IT service management tools that make sense for your organization’s unique service model: from incident, problem and change requests, to service requests, client knowledge and asset management
Cybersecurity Management Software for MSPs Icon
Cybersecurity Management Software for MSPs

Secure your clients from cyber threats.

Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
The Secure Workspace for Remote Work Icon
The Secure Workspace for Remote Work

Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
Run applications fast and securely in a fully managed environment Icon
Run applications fast and securely in a fully managed environment

Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.

Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.

Additional Details for Doomsday Engine

Operating Systems

Linux, FreeBSD, BSD, Mac, Windows

Languages

English

Intended Audience

Developers, End Users/Desktop

User Interface

X Window System (X11), Win32 (MS Windows), Cocoa (MacOS X), Qt

Programming Language

Python, C++, C

Registered

2003-02-23

Last Updated

Categories

First Person Shooters, Game Engines

Maintainers

danij, skyjake

Keep Me Updated!