Master/node to gather and graph "everything" on your systems using Tobi Oetiker's rrdtool. It can optionally warn your surveillance software. This software package was originally called LRRD. The project. Please see http://munin-monitoring.org/
WebInject is a tool for automated testing of web applications and web services. It can be used to test system components with HTTP interfaces, as a test harness to create a suite of functional and regression tests, or for service-level monitoring.
A simple command to convert calendar dates to julian dates. Quite useful in
timing situations where you need elapsed time between dates.
Also useful for astronomy applications.
UMark is a graphical interface that allows gamers to easily configure and run benchmarks on Unreal Tournament 200x. It supports "botmatch", "flyby", and "timedemo" benchmarks. You may save/load results, or submit them online.
Perf::Stopwatch is a Perl Module that can be quickly added and removed from any existing code to debug/optimize portions of code. Example of use are: database calls, loop efficiency, total script time, and webpage timeouts.
Web site load tester. Simulates multiple user types and counts. Includes proxy server for recording playback scripts, and log evaluator for generating result statistics.
A console-based web scripting tool, (eventually) with Perl scripts for stress/performance testing. West is capable of both HTTP and HTTPS transactions using SSLeay or OpenSSL.
lla is an LDAP Logfile Analyser , it generates statistics At this moment only NS 4.11 Logfiles have been tested. Your on your own if you want to analyse other type of Logfiles. But feel free to give feedback on your experiments and contribute patches to t
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.