Algorithms Software

OS OS

  • More...

Category Category

License License

Translations Translations

Programming Language Programming Language

  • More...

Status Status

  • More...

Audience Audience

User Interface User Interface

Database Environment Database Environment

Algorithms Software

  • Focus on your Business with an integrated Business Cloud Focus on your Business with an integrated Business Cloud Icon
    Focus on your Business with an integrated Business Cloud Icon

    Reliable & Secure Communications Systems

    • 90+ features: video, file management, cloud phones
    • 99.999% financially backed uptime SLA
    • Expert support, certified by J.D. Power 2 years in a row
  • Get the most out of your virtual environment. Get the most out of your virtual environment. Icon
    Get the most out of your virtual environment. Icon

    Monitor VMware® vSphere® and Microsoft® Hyper-V® environments from one screen. Rule your VM environment with SolarWinds® Virtualization Manager.

    SolarWinds Virtualization Manager (VMAN) provides VMware vSphere and Microsoft Hyper-V performance monitoring in a single pane of glass. Use built-in management actions to instantly remediate virtualization issues. VMAN also features PerStack ™, helping you accelerate identification of root cause by dragging-and-dropping VM performance metrics on a common timeline for immediate visual correlation across all your VM data. Try it free for 30 days!
  • XOR encrypt v2.0 Icon

    XOR encrypt v2.0

    Encrypt Your Text documents with XOR encryption

    This software provides an easy graphical way to encrypt your text documents from source code , text files ,scripts even jpeg files .It is a enhanced version of my earlier project https://sourceforge.net/p/xorencrypt which used win32 GUI . This is a demonstration of working of XOR encryption which was used by Germans in World War II (http://en.wikipedia.org/wiki/Lorenz_cipher) . Besides from XOR'ing the message with password after every encryption the key changes pseudorandomly. The password you provide is hashed ( SHA256 ) and saved into the encrypted file to check if the password provided is correct.This algorithm has limitations in general more the numbers of relative characters in the password to plaintext more secure will be the encryption. XOR encrypt has a 3.5 of 5 editors rating from softpedia http://www.softpedia.com/get/Security/Encrypting/XOR-Encrypt.shtml

    Downloads: 20 This Week Last Update: See Project
  • C++ Revenue Management Open Library Icon

    C++ Revenue Management Open Library

    That project (RMOL) aims at giving developers concerned by the Revenue Management arena a library delivering a reference implementation for most of the published algorithms and methods. That library is intended to be used in simulated environment: it does not intend to be used in real world production systems.

    Downloads: 0 This Week Last Update: See Project
  • PUMA Repository

    This information is archived. The berliOS mirror will be shut down by end of April 2014. Please visit http://puma-repository.sf.net or http://sourceforge.net/projects/puma-repository/ to get current information on PUMA.

    Downloads: 0 This Week Last Update: See Project
  • Quasi Biclique abandoned

    Abandoned version of qbc. DOES NOT WORK properly

    Downloads: 0 This Week Last Update: See Project
  • Teknologjia Informatike (IT) ne SHQIP

    Ky eshte nje projekt i HAPUR/FALAS per publikun Shqip-foles i cili permban nje seri Video-Kursesh, Udhezime, dhe Shembuj Kodi per gjuhe (web) si: XHTML, CSS, JS, PHP, AS3 etj. si dhe per Desktop: C++, Java, Adobe Air etj. + programe/praktika te ndryshme.

  • Locate Sensitive Data across Networks and Workstations Locate Sensitive Data across Networks and Workstations Icon
    Locate Sensitive Data across Networks and Workstations Icon

    Build the Business Case for Effective Security Investments

    Your customers recognize the importance of security, but often don’t realize the urgency until they see something tangible. SolarWinds Risk Intelligence assigns value to your data vulnerability, helping you build a strong business case for data protection and triage the most important problems to tackle. Some powerful features include data risk communicated as financial impact, at-risk data discovery and PCI DSS, PAN & PII scans.
  • Previous
  • You're on page 1
  • Next

Get latest updates about Open Source Projects, Conferences and News.

No, Thank you