AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Try it Free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
A framework for tools for code clone (i.e. duplicated code) detection and removal for Eclipse Platform. It provides tight integration into Eclipse, enabling incremental adaptation of clone data and enables use of various clone detection algorithms.
A portsentry clone written in java designed to run on any platform. You be able to give CLI for blocking access after detection (ie. shell, cmd, bat, etc..), Customizable for all ports on UDP,TCP
idyuts is \"I Dare You to Use This Shell\"; a pre-hibernate approach to replacing an ORM written with jython functors into a pure-Java language command pattern. The \"pipeline codegen artifacts\" are simple IoC templates, and trivial to adapt
Secure remote access solution to your private network, in the cloud or on-prem.
Deliver secure remote access with OpenVPN.
OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
TarProxy is a Statistically-Driven SMTP Tarpit. TarProxy calculates the probability that an incoming mail is spam, and uses that information to control a variable-viscosity tarpit for each connection.
WAGćF provides low-level services required by the wireless games of today. Includes animation; collision detection; fields, gravity; mass effects: inertia, momentum; rotation; and a simple rule-based mechanism to add modular game logic components.
The purpose of SNX is to have a modular series of components that report back to a central repository and 'AI' for pattern recognition and anomoly detection. This is to help with IDS systems, and to move to the next generation of security.
Grok is a library of natural language processing components, including support for parsing with categorial grammars and various preprocessing tasks such as part-of-speech tagging, sentence detection, and tokenization.
Sales CRM and Pipeline Management Software | Pipedrive
The easy and effective CRM for closing deals
Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
Manage sources of video (i.e., from a security camera), recording clips where motion has been detected, and allowing those clips to be replayed.
Variable lead-in/out time, motion detection, logging.
JavaIDMEF is an implementation of IDMEF in Java originally developed by Chris McCubbin. The Intrusion Detection Message Exchange Format (IDMEF) describes the structure and transport facility of information between IDS and management.
TX4J is a lightweight local transaction framework that allows you to make your Java code transactional. It supports isolation level 0 - 3. TX4J includes a lock manager and a deadlock detection/resolving mechanism.
The MFlow project aims to create a modular messaging client in Java. Its architecture should make it as easy as possible to add support for new protocols, as well as maximizing configurability.
JFetch is an application to download your email through protocols like POP3 and IMAP. The decision of whether to download a mail or not is made through a sequence of filters. The user can easily add customized filters to this sequence.
SnortKonsole is a Java-Frontend for the Open Source Network Intrusion Detection System Snort. It supports all configuration-aspects of Snort. The configuration distribution and activating of sensors is done via scp/ssh.
This project uses ICQ-style logic against a POP3 mailbox. Any incoming mail is checked against known users. Any not found can be either a) sent a "request authorization" form, b) ignored, or c) deleted.
JEM is an SMTP server with pluggable components that let you
process email in any way you like. It can also extend beyond
emails into generalised message processing (like JMS) and can
even generate its own messages based on a Cron-like facility.
POP3 Spam Filter Proxy is a multiuser POP3 proxy written in Java. Other than most other email filtering programs it works passively and transparently each time a user checks her or his mailbox. The filters so far are be based on regular expression searche
JaMaRe (JaMaRe ain't a Mail Reader) has grown out of my own need for a hacker's mail filter. JaMaRe has it's own internal mail folder system, and a very extensible filtering system. JaMaRe can also be used as Mail Router.
Originally a software partnership between my best friend and myself, Diverse Developments seeks to write "useful stuff", of a very diverse nature...
Current projects include a file encoder, and a double-entry accounts package.
Mail Receipt is a collection of utilities used to seed, receive, and summarize email receipts to be sent by HTML enabled mail readers without the mail recipeient's knowledge.
This library enables you to print in Java programs in an elegant way.This library includes support for Print Dialog, Automatic Printer detection, Print configuration, Print Preview and components that derive from your suggestions.