As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
OrangeHRM provides a world-class HRIS experience and offers everything you and your team need to be that HR hero you know that you are.
Give your HR team the tools they need to streamline administrative tasks, support employees, and make informed decisions with the OrangeHRM free and open source HR software.
Single-honeypot is a powerfull tool, for security interest about the estudies of techniques of breaking systems.
This is, a singular or little honeypot for test your networks for hostiles visitors.
This made in perl script.
Simulate different servi
Addons to the Metadot Portal System that allow metadot sites to communicate and interact with each other and thus allow a wider community of Metadot Sites that extends beyond a single site's community but to other communities as well.
Small scripts, config files & how-to to provides simple interface statistics for MRTG without usiong SNMP daemons on routers which wave to be monitored.
WHAT YOU NEED TO USE THIS TOOL: MRTG on a server, BASH...that's all!
Improvements over DF467: - operator host masking and ghost flag - mode hacking - several other small improvements The goal for the project is to remove code for all non-POSIX compliant operating systems and anything else that will make it a cleaner and m
A tool suite to analyse protocol streams and whose flow characteristic. On the other side, the tool suite can be used to gather information about the network infrastructure and detect bottlenecks.
Web based system for suggesting a restaurant for you and your co-workers to eat at each day. Input preferences per person, and track history. Each restaurant receives a rank based on average rating, and history.