2 projects for "foss-cloud" with 1 filter applied:

  • Atera all-in-one platform IT management software with AI agents Icon
    Atera all-in-one platform IT management software with AI agents

    Ideal for internal IT departments or managed service providers (MSPs)

    Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
    Learn More
  • Deliver trusted data with dbt Icon
    Deliver trusted data with dbt

    dbt Labs empowers data teams to build reliable, governed data pipelines—accelerating analytics and AI initiatives with speed and confidence.

    Data teams use dbt to codify business logic and make it accessible to the entire organization—for use in reporting, ML modeling, and operational workflows.
    Learn More
  • 1
    zpaqfranz

    zpaqfranz

    Zpaq compatible archiver for Win, Linux, Free/OpenBSD, Solaris & MacOS

    ...Far more efficient than Time Machine or ZFS snapshots - perfect for VM backups and permanent archiving, effortlessly handling TBs and millions of files. Optimized for cloud/NAS/USB with ultra-low bandwidth, military-grade encryption, and 1GB/s+ speeds on modern hardware. Why Choose zpaqfranz? ✓ Complete: Single/multi-file storage architecture ✓ Modern: SHA-2, SHA-3, BLAKE3, XXH3 and more ✓Paranoid: Antiransomware data verification with integrity checks ✓ Runs everywhere: TrueNAS, ARM-powered, even ESXi ✓ Lightning-fast: Multi-core processing + hardware acceleration ✓ Battle-tested: 15+ years of active development since 2009 Perfect for system administrators managing critical backups and anyone needing bulletproof archival solutions with enterprise-grade reliability. ...
    Downloads: 43 This Week
    Last Update:
    See Project
  • 2
    Naeon

    Naeon

    The safest way to store private data in untrusted (cloud) environments

    Naeon is a data encryption and sharding method designed to secure data in potentially untrusted off-site storage locations. It uses AES-256 encryption with a randomly generated passphrase, followed by obfuscation techniques to make the encrypted file unidentifiable. The data is then sharded into one private chunk containing the encryption key and part of the data, and multiple public chunks. Each chunk is renamed using its SHA-512 hash, and all chunks are timestamped equally. A filename...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next