Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.
Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
ExpSuite is a software framework for applications to perform psychoacoustical experiments. ExpSuite allows acoustic and electric stimulation for normal hearing and cochlear implant listeners, respectively.
math lib for .NET. n-dim arrays, complex numbers, linear algebra, FFT, sorting, cells- and logical arrays as well as 3D plotting classes help developing algorithms on every platform supporting .NET. Sources from SVN, binaries: http://ilnumerics.net
Statseeker is a powerful network performance monitoring solution for businesses
Using just a single server or virtual machine, Statseeker can be up and running within minutes, and discovering your entire network in less than an hour, without any significant effect on your bandwidth availability.
Tools for mass spectrometry, especially for protein mass spectrometry and proteomics: Quantification tools, converters for Applied Biosystems (Q Star and Q Trap), calculation of in-silico fragmentation spectra, converter for Mascot result files
This toolkit allows complete control of a microscopy setup from Labview, Matlab, Scilab, Python, .Net, VB, IgorPro, Mathematica and more. Included is a standalone program for image acquisition and scripting control of a scientific microscope.
Herramientas informáticas para auxiliar en el proceso de identificación de parámetros dinámicos en sistemas estructurales. Desde el pre procesamiento hasta la elección y ratificación de modos.
A user-friendly interface for running simulations of the gene networks comprising the circadian clock. Modules allow the simulation of experimental protocols with just a few mouse clicks. Users can fine-tune simulations to suit their particular interests.
Software and support solutions to protect your clients’ critical business assets
ConnectWise SIEM (formerly Perch) offers threat detection and response backed by an in-house Security Operations Center (SOC). Defend against business email compromise, account takeovers, and see beyond your network traffic. Our team of threat analysts does all the tedium for you, eliminating the noise and sending only identified and verified treats to action on. Built with multi-tenancy, ConnectWise SIEM helps you keep clients safe with the best threat intel on the market.