Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
Create free account
Secure File Transfer for Windows with Cerberus by Redwood
Protect and share files over FTP/S, SFTP, HTTPS and SCP with the #1 rated Windows file transfer server.
Cerberus supports unlimited users and connections on a single IP, with built-in encryption, 2FA, and a browser-based web client — all deployable in under 15 minutes with a 25-day free trial.
ZET-CSV is the C++ library for csv format. ZET-CSV uses STL library. Interface CSV container similar to the interface std::vector.
You can use ZET-CSV (not as the library) with your code by rewriting the Makefile.
ZET-CSV contains following csv extension: a different number of columns in the rows, literals \r, \n, \r\n indicate the end of the row.
(abandoned and outdated project) convert vcard data into csv format
vcf2csv is a command line tool, written in ANSI-C (C90), converts a vcard (vcf) file to csv.
Please note: the ability to generate HTML-files will be removed in the near future.
dhcp-gen is a perl script that was written by me and Trond Erik Dalho to simplify editing dhcpd.conf for adding static ip to computers and equipment on our school. It also made it easier to do manage the network by limiting some computers access to the local network only. Creating closed networks. And it also worked as a database over all our computers and equipment, making it easier to keep track of everything.
All information about equipment is stored inside csv files which are comma separated.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.