Showing 4 open source projects for "using"

View related business solutions
  • Retool your internal operations Icon
    Retool your internal operations

    Generate secure, production-grade apps that connect to your business data. Not just prototypes, but tools your team can actually deploy.

    Build internal software that meets enterprise security standards without waiting on engineering resources. Retool connects to your databases, APIs, and data sources while maintaining the permissions and controls you need. Create custom dashboards, admin tools, and workflows from natural language prompts—all deployed in your cloud with security baked in. Stop duct-taping operations together, start building in Retool.
    Build an app in Retool
  • Find Hidden Risks in Windows Task Scheduler Icon
    Find Hidden Risks in Windows Task Scheduler

    Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.

    Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
    Download Free Tool
  • 1
    GSI Student ToolBox
    GSI student toolbox is a software package made for teaching purposes. It allows you to perform seismic inversion using global sthocastic inversion method made within CERENA/CMRP. NOTE: you can perform the same operations done with GSI Student Toolbox with our newest software GEOMS2. You can download the beta release here: https://sourceforge.net/projects/geoms2/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    The Grid-Cache is a GSI HTTPS data transfer server. The server can share, for read and write, local resources and remote repositories using a cache based optimization.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Tsukuba-GAMA provides user and credential management, using the Grid Security Infrastructure (GSI) based on Public Key Infrastructure (PKI), X.509 certificate, proxy certificate, and the concept of Virtual Organization (VO).
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    pam-pkinit enables to get kerberos 5 credential using PKINIT in PAM session module. pam_pkinit was initialy built to provide seamless access to kerberized sites using GSI-SSH and PKINIT (Heimdal). It could be used in similar situations too.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Previous
  • You're on page 1
  • Next