Get Avast Free Antivirus | Your top-rated shield against malware and online scams
Boost your PC's defense against cyberthreats and web-based scams.
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
Free Download
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Google() meets the Matrix. Red Piranha combines Lucene (Searching Ability), XML-RDF (ability to learn), Tomcat (for P2P Power) and Spring (Ease of use) to not only let you find anything, anywhere, but to actually understand what you are looking for.
PART is a light-weight middleware for developing pervasive applications (specifically games) that run on a range of different devices (PCs, mobile phones, microcontrollers) in a heterogeneous network environment.
the bbsc - BinBase Cluster System is a specification for the distributed calculation of jobs using j2ee and a cluster. We provide an implementation for Rocks Linux Cluster (Sun Grid Engine).
This project has been merged into the BinBase system a couple of years back.
BruteNet is a system of the distributed brute force and distributed calculations built on user extensions capable to solve a great number of problems related to the partition on a lot of machines.With sample extention you can distribute brute md5-hash
Fastly's edge cloud platform delivers faster, safer, and more scalable sites and apps to customers.
Ensure your websites, applications and services can effortlessly handle the demands of your users with Fastly. Fastly’s portfolio is designed to be highly performant, personalized and secure while seamlessly scaling to support your growth.
Calana is a market-based grid scheduling infrastructure. The system is composed of a central broker and agents close to the resources. The system balances user and provider preferences.
Java-based security platform which provides a multi-user service middleware for distributed systems. Features: service environment, Shell-based interaction, user authentication (password, soft-token, smard-card), policy enforcement, Web services support
ActiveGrid is an Enterprise Web 2.0 solution that allows the composition of code-free applications that comply with corporate IT standards. Technologies include Python, Java, XForm, Xpath, WSDL, CSS, XML Schema (XSD), XACML, and BPEL.
Jbi4ejb is a JBI compliant Binding Component that allows existing EJB to interact with a JBI ESB. EJB operations can be called from the ESB without the need to modify or even redeploy the EJB.
WS Arena is a XMPP platform that allows applications to multiplex streaming messages of any content type. Messaging can be accomplished asynchronously across networks in real time. Possible transport modes include WS-to-WS, WS-to-XMPP, and XMPP-to-XMPP.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
RUNES is a cross-platform, component-based middleware framework allowing for dynamic reconfiguration of functionality. Its lightweight implementation spans powerful nodes like PDAs and PCs, as well as tiny embedded devices.
The DBE Studio is an Integrated Development Environment (IDE) for the Digital Business Ecosystem (DBE). It includes eclipse plugins that allow business services to be analysed, and corresponding software services to be defined, developed and deployed.
MultiJADS is a domain independent multiagent active design documents shell. It uses multiagent technology to support activities in concurrent and distributed design systems and is based on the Active Design Documents (ADD) approach.
DolphinNet is an easy to use server and distributed processing library for Java. It uses objects to communicate between a client and server. DolphinNet approaches this task using object serialization over a standard TCP/IP connection.
Gridder is a group of portlets that simplify the use and administration of grid services. Especially for job submission management. Gridder also extends and documents the functionality of the OGCE Bundle. It is plenty of useful documentation.
Alternative implementation of Spring framework remoting subsystem that supports different schemes of remote communication between client and server (1-1, 1-many, dynamic services discovering).
The CCM Tools are CASE tools used for generating CORBA components, test components, and test programs based on source IDL files. Various target languages can be generated. Scripting language wrappers can also be generated to enable rapid prototyping.
Java Hibernation Package is an experimental implementation of Java thread serialization mechanism based on the Java Platform Debugger Architecture (JPDA). It is designed to support serialization of synchronizing multiple threads.
The Gridbus Grid Service Broker, is a service-oriented, economy and data-aware resource broker system that uses a simple, extensible middleware independent architecture that mediates access to distributed resources on a local / Global Grid of computers.
GUI for distribution of OMNeT++ simulations on different computers.
This software includes server and simulation management and uses Java SWT and Web Services.
The Citizen Privacy Service is an asynchronous component using artificial intelligence capabilities including DL decidability and first order logic provenance that provide policy decision and policy enforcement points based on the US Privacy Act of 1974.