Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
The Security Annotation Framework (SAF) is an instance-level access control framework and field-level encryption framework driven by Java 5 annotations.
This is an algorithm to codify Spanish words to an equivalent phonetic code. That intends to be a substitute of Soundex algorithm that is not practical to use in Spanish. It is very useful for search engines based on text information.
This program serves to keep track of different types of accounts (technically an infinity number of different types). Currently only bank and equity accounts are supported. Data is saved on the user's computer and encrypted using the DES-algorithm.
Semeir is a Encryptionalgorithm, Capable of block encryption. It is written in pure C. It is platform independent, and is promising for Embedded systems. Intended as an alternate, yet secure data encryption cipher.
HelloWorld is a decentralized social network based on OpenID, P2P and different JAVAencryption technologies. It will offer all the fundamental functionalities of a social network platform respecting the right of informational self-determination.
A disk based production quality RTree based upon Guttmans quadratic split algorithm having following features:
Buffering with dirty write,
Index joins,
Tree Seeding,
Window and NN queries,
Runtime STR Packing capability,
Completely Thread safe.
NetBeans, pure Java. The Cryppie can protect your files by encrypting its content, possibility to compress files before encryption. It's destination for keep information in safe on your flash drive or another storage.
The project will develop an in – memory object cache utilizing the LRU (least-recently-used) algorithm. The cache will store the objects that are most accessed within a fixed size memory pool. Thus system is keep statistics and calculates tradeoffs.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
MC2 Java Multicast Chat is a serverless p2p chat based on multicast datagrams. Very useful if you want to quickly have a chat session in a Lan without having to do annoying setups. Supports file sharing / sending,multiple channel chat and data encryption
Processes boolean functions which can be provided either as a list of 0s and 1s or which can be provided as a formula in first-order logic (using disjunctive or conjunctive normal forms). Internally the Quine McCluskey algorithm is used.
The Mav.Crypt tool will be upgraded to many different encryption methods. At the Moment, the only method is ROT13, but we are developing some other technics and a new Algorithm. More Infos shortly at the Project Web Page.
Primarily applied in experimental psychology, where it is used to create experiment schedules. It even can be applied to other planning-activities that have to met boundary constraints. Rando uses a genetic-algorithm to construct a fulfilled schedule.
jCryptPad stores text informationen hierarchical, e.g. passwords, important texts etc. The data is saved in a encrypted xml file. Encryption is done with the AES algorithm. Additionally a password generator and a text encryption editor is also included.
This is an academic project; the main objective is to generate an algorithm to parallelize a CNF formula and then feed the distributed parts to sequential SAT solvers, for this project we have choose to use Sat4J as the solver.
This educational software simulates an Ad-hoc network with AODV algorithm, it uses a high level view and only works in Routing layer. it has a user-friendly graphical user interface and has been written in java language.
A hierarchical representation language for music, which can be used as a human algorithmic composition tool or as a semi-automated composition tool using a genetic algorithm with human listeners as the fitness function.
TACS (Trust Ant Colony System) is a Trust model for P2P, Ad-hoc and Wireless Sensor networks (also valid for multi-agent systems) based on the bio-inspired algorithm ACS (Ant Colony System).
Hermes FTP Server is a free, cross-platform FTP server adhering to RFC 959, RFC 2228, and RFC 2389. It is being developed in Java with a strong focus on security and extensibility.
Email client & server with clustering support. Program focuses on data processing and management – the archiving, sending, receiving and encryption of e-mail messages with the related management of accounts. Functionality divided into server and client