Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Hyperic is application monitoring and performance management for virtual, physical, and cloud infrastructures. Auto-discover resources of 75+ technologies, including vSphere, and collect availability, performance, utilization, and throughput metrics.
Odoo 8 Server Control beta-1, for Windows, is java application that controls running Odoo 8 server and database, and alose monitoring the log file (openerp-server.log)
Cyberoam iView; the Intelligent Logging & Reporting solution provides organizations network visibility across multiple devices to achieve higher levels of security, data confidentiality while meeting the requirements of regulatory compliance.
To know more about Cyberoam and it’s security solutions visit us at www.cyberoam.com.
Centralized Logging to a database with alerts and powerful RCP-UI
LEMA is an easy to use Log-Server. It supports asynchronous logging of multiple applications (log4j-appender). The logs are processed and save to a database. An RCP-UI supports Live View, History View with advanced filters. You can use it for Error Monitoring / Notification; in order to do this a rule-based labellng (for instance stacktrace grouping) is performed by the server.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
An adaptable, platform-agnostic application incident reporting infrastructure ranging from logging libs and webservice-based reporting to a J2EE logging server to a pluggable connection to issuemanagers.
SquidRH is a utility to convert squid log files to a database (like MySQL or PostgreSQL) and then generate statistic pages in real-time. This consumes much less the necessary than querying a squid log file, which sometimes gets very big.