Showing 4 open source projects for "java on java"

View related business solutions
  • Earn up to 15% annual interest with Nexo. Icon
    Earn up to 15% annual interest with Nexo.

    Let your crypto work for you

    Put idle assets to work with competitive interest rates, borrow without selling, and trade with precision. All in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • Earn up to 15% annual interest with Nexo. Icon
    Earn up to 15% annual interest with Nexo.

    Access competitive interest rates on your digital assets.

    Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform. Geographic restrictions, eligibility, and terms apply.
    Get started with Nexo.
  • 1
    Jave logging api for clustered applications. Provides logging at a trasaction level - logging all information or nothing. Please visit http://logbag.com for the project homepage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    HypoLog is a collection of simple logging libraries for different platforms with an emphasize on ease of use. Currently supported are Java and .NET.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Log4net has moved to http://logging.apache.org/log4net. The .NET implementation of the popular log4j Java API providing flexible and arbitrarily granular control over log management and configuration.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    C# Logger This is a logging tool similar to log4j for java. The tool is designed to handle debugging, information and error logging. Currently only windows event logging is supported however multiple logging targets are planned for future releases.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Securden Privileged Account Manager Icon
    Securden Privileged Account Manager

    Unified Privileged Access Management

    Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
    Learn More
  • Previous
  • You're on page 1
  • Next