Simplify IT and security with a single endpoint management platform
Automate the hardest parts of IT
NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers.
The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support.
Learn More
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Pretty Damn Quick (PDQ) analytically solves queueing network models of computer and manufacturing systems, data networks, etc., written in conventional programming languages. Generic or customized reports of predicted performance measures are output.
a free cross platform checksum utility, supports 58+ hash algorithms
Development of this project has been moved to https://github.com/jonelo/jacksum. This site has been left for historical purposes ONLY, you find older Jacksum versions here. Please visit the GitHub site for current development.
Jacksum 1.7.0 is a platform independent checksum utility (written entirely in Java) for computing and verifying (integrity check) checksums, CRC and hashes (fingerprints). It supports 58 popular hash algorithms and a lot of unique features.
The collaborative framework Conzilla has primarily been developed to enhance the concept browser Conzilla (http://www.conzilla.org) with collaboration facilities. The Collaborilla framework is generic and can be used by other projects as well.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
BioWebAuth (Biometrics for Web Authentication) is an open source Java framework intended to provide single sign-on web authentication based on BioAPI-compliant biometric software or devices. It uses the JA-SIG Central Authentication Service architecture.
MACOW is a formal and scalable mandatory access implementation suitable on open worlds such as the provided on Semantic Web, Autonomic Computing and Coaltions and Federations scenarios. It is able to access control on distributed systems.
OAproject implements a plataform to allow applications to interact. Apps using the platform send/receive messages through a message oriented middleware. Main features are a Single Sign On (SSO), Identity Management System (IMS) and a provisioning system
GridPlan is an open source capacity planning and simulation tool for Grid Computing. GridPlan estimates the cost and performance of Grids comprised of Processor, Storage, Router and Switching nodes.
Role Manager is a security management framework based on the NIST model for Role Based Access Control (RBAC) and the Java[TM] 2 Platform security standards. The access control policies and the RBAC Model are implemented using the RBAC profile of XACML.
Ensure the availability of your data with coverage across AWS, Azure, and GCP on MongoDB Atlas—the multi-cloud database for every enterprise.
MongoDB Atlas allows you to build and run modern applications across 125+ cloud regions, spanning AWS, Azure, and Google Cloud. Its multi-cloud clusters enable seamless data distribution and automated failover between cloud providers, ensuring high availability and flexibility without added complexity.
The program is used for translating EPAL to P3P. EPAL is used for enterprise internal privacy policy definition, and P3P is used for covering all the aspects of web sites\' privacy policy. This program is used to keep these two privacy policies in sync.
To provide a bunch of useful applications for daily use. The first of those applications was donated by NIH\'s DECA, it\'s called REX and is a Request/Bug tracker. All applications will be Struts 1.1 and greater based.
The beSee-2-x architecture brings JVM wide instrumentation for AOP systems, independant from bytecode kit (BCEL, Javassist).
A plugin is provided to instrument BEA WebLogic (v7) for tracing purpose (servlet->EJB->CMP->DB), with full JMX capabilities.