2 programs for "open-lates" with 2 filters applied:

  • Red Hat Ansible Automation Platform on Microsoft Azure Icon
    Red Hat Ansible Automation Platform on Microsoft Azure

    Red Hat Ansible Automation Platform on Azure allows you to quickly deploy, automate, and manage resources securely and at scale.

    Deploy Red Hat Ansible Automation Platform on Microsoft Azure for a strategic automation solution that allows you to orchestrate, govern and operationalize your Azure environment.
  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
  • 1
    zpaqfranz

    zpaqfranz

    Zpaq compatible archiver for Win, Linux, Free/OpenBSD, Solaris, MacOS

    Advanced archiver (zpaq fork) with deduplication and versioning. Never prune your backups: keeps a forever-to-ever copy (even thousands of versions) of your files, conceptually similar to Mac time machines, or zfs' snapshots, but much more efficiently. Ideal for virtual machine backup and "freezing" zfs snapshots forever. Easily handles millions of files and TBs of data. Allows rsync backups to the cloud (or NAS, or USB) with minimal data transfer, encryption and very limited...
    Downloads: 39 This Week
    Last Update:
    See Project
  • 2
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a secure cloud storage solution that uses unbreakable military-grade encryption and zero-knowledge privacy to protect confidential data in an untrusted environment. The data are encrypted using the AES 256-bit encryption algorithm with a randomly generated 128-character passphrase. Then, it is split into small pieces called chunks, which are obfuscated by adding random data to each chunk to make them unreadable and indecipherable to unauthorized individuals or processes. The...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next