One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Build Securely on Azure with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
UpClient Logs uptime with uptimes.wonko.com.
UpClient sends the time a computer has been running since its last reboot to the Uptimes Project. The server generates individual & aggregate statistics of various operating system & hardware configurations.
This Daemon written in Perl, logs FreeBSD ipfw ip accounting counters every X seconds/minutes, so after rebooting, crashing, flushing, zero out your ipfirewall table, you don't loose any mayor traffic information.
Php Log Analyzer (aka PLA) is a Log Analysis tool for Apache. There are lots of log analyzer softwares available on the internet but most of them have their own data storage ways. PLA is a tool to analyze log files and store results into MySQL databases.
Big-Brother is a collection of J2EE filters and servlets that provide custom monitoring and auditing of web-applications, keeping track of who does what, when, and how often. It makes use of the jakarta-apache Struts framework for the interface GUI.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Analyse et filtrage de l'observateur d'évčnements de Windows NT.
Récupčre les évčnements, les stocke dans une base MySQL et une série de pages PHP permettent de ne retenir que les évčnements les plus importants.
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
To address the need for high-quality open source Java Jabber software. A client applet which can also work as a desktop application is currently the main focus of this project.
Frontier Data System is a collection programs for data acquisition and data mining. It uses MySQL and PHP to monitor process variables and performance of shop floor equipment. Produces information on issues such as cycle time, downtime and SPC.
my-swatch pretends to be an implementation of msyslog and swatch together. What it pretends to accomplish is put all together, to log events to a remote database (like msyslog) and to awake triggers (like swatch).
startx is the project name for an interface build in php which takes the output of some products like MRTG or awstats or ACID... and put them together in the same Web interface.
ppplog keeps track of your ppp online session costs. It detects online/offline states and automatically calculates costs according to your local phone company. Simplicity and flexibility was key in development.
The purpose of this project is to provide a comprehensive system for backing up to CDR the log scripts produced by syslog-ng. The scripts support verification of the CD after burning, optionally removing log files after they have been burnt to CD
Whale is a project that does pre-filtering for logfiles created by the squid proxy server. The accesslog creates by squid will be put in a SQL databases (currfently PostgreSQL). After that a usercan filter out data you don\'t need and call other progra
Benson is an automated monitoring system designed to ease the life of a network, system,
and database administrator. Benson harness the power of Perl for flexibility all while maintaining the low foot print required of a networked monitoring system.
Automated Computer Auditing Daemon - Keep a track of what's going on with your systems: suid, sgid, world writable, hidden and unowned files monitoring as well as important file's md5sums management audits sent to your mailbox on a regular basis.
pam_eps enables you to authentify users against a machine with a ssh daemon running. If the user exists in the remote server and the password is correct a new user with the expecified password and username will be created in the local machine.