Software

GuardMetrics GuardMetrics

GuardMetrics is a security operations management software  designed for security guard services who seeks an affordable, yet very capable, means to compete. With GuardMetrics you can track and mange your guard tours and patrols, while allowing your gaurds to send reports from your officers from any smart-device, including their personal devices.

KDE Connect KDE Connect

KDE Connect is an open source software that enables communication between all your devices. With KDE Connect, you can get all your phone notifications instantly synced to your desktop, so that you never miss that critical message. You can also directly reply to text messages from the computer without having to pick up your mobile device. If you want to share files or links between devices, KDE Connect got you covered as well. As the software allow you to browse and share your phone files remotely or quickly open a link on the other device.

ArtBinder ArtBinder

Art galleries, artists, collectors, museums, and foundations across the globe uses ArtBinder to run their business. ArtBinder provides inventory and contact management system that can help you run yours too.

db<>fiddle db<>fiddle

An online tool for testing, demonstrating and sharing database commands and scripts.

Dribbble Dribbble

Discover the world's top designers and creative minds with Dribble. It's a platform where designers gain inspiration, feedback, community, and jobs and is your best resource to discover and connect with designers worldwide. Dribble allow anyone to create a profile where they can showcase their work and interact with the community through projects, collections, shots and likes.

DebugBear DebugBear

Front-end website performance monitoring

Magisk Magisk

Magisk is known as a "systemless" root method. It's essentially a way to modify the system without actually modifying it. Modifications are stored safely in the boot partition instead of on the main system. With Magisk you can root phone or tablet to give you complete control over the system with compromising your device.