Over two-thirds of people reuse passwords across sites, resulting in an increasingly insecure e-commerce ecosystem. Learn how passwordless can not only mitigate these issues but make the authentication experience delightful. Implement Auth0 in any application in just five minutes
As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
a C++ template container implementation of k-dimensional space sorting based on the kd-tree data structure. THIS PROJECT HAS MOVED TO ALIOTH.DEBIAN.ORG
Syntax highlight system using JavaScript for any aviable programming language.
-Unlimited extensibility
-Posibility of creation specific rules of literal detection
-Adjustable literals output styles
-Detection of "bordered" and word-literals literals
Secure and customizable compute service that lets you create and run virtual machines on Google’s infrastructure.
Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
A utility-program for the K Desktop Environment (KDE) with similar functionalities as Apples Exposé currently available in Mac OS 10.3. The program enables a user to get a one-click overview over open windows on their desktop.
A guestbook written in PHP. It features page spanning, email notification for the admin, administration section for easy deletion of messages and updating, and multiple language support is also included. There is much more but you can try the demo and se
The metaspace server is an object store that handles three things: encryption, version control and metatagging. Files stored in it will be searchable based on the metatags, and downloaded by anyone although that will be useless without the encryption k
MyPHPSchool, intends to provide, modular and easy to modify content managment system specialized for K-12 Schools written in PHP, and using a MySQL database. Other Features include a Calendar, a Web Based Gradebook, and Remote File Acess for users.
Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.
Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
Konstrui solvon por interŝanĝi, kunfandi kaj diserigi adresarojn inter amikoj (sur baze de XHTML, JSP, EJB k XML).
Krom la bazaj funkcioj pri administrado de adresaro ni provos aldoni ankaŭ tion, kio necesas por organizado de IJK.
The K Network will provide a network infrastructure for encrypted anonymous distibuted communication. Distributed chat will be the first application. Goals are anonymity for both sender and receiver, no central point of failure, and scalability.
kasm is an assembler for the Saturn microprocessor, used in the HP48/HP49 calculators. It uses MASD syntax, which has only very small incompatibilities with the traditional syntax, supports a few constructs that make the assembly language be closer to a
This is a solution to help an enterprise to monitor their key data
This is a solution to help an enterprise to monitor their key/sensitive data. It is composed of seven major components: k-data modeling, k-data capture, k-data store, k-data watcher, k-data metrics, k-data view and k-data action.