AlienVault® Unified Security Management™ (USM™) is an innovative approach to security monitoring, delivered in a unified platform. The USM platform includes five essential security capabilities that provide resource-constrained organizations with everything they need for effective threat detection, incident response, and compliance management, in a single pane of glass.Advertisement
OSI-Approved Open Source (14)
- Apple Public Source License (1)
- Artistic License (1)
- Attribution Assurance License (1)
- BSD License (1)
- Common Development and Distribution License (3)
- Computer Associates Trusted Open Source License 1.1 (2)
- Eclipse Public License (1)
- Educational Community License, Version 2.0 (5)
- GNU General Public License version 2.0 (6)
- GNU Library or Lesser General Public License version 2.0 (2)
- Non-Profit Open Software License 3.0 (1)
- Open Software License 3.0 (5)
- Public Domain (2)
- Grouping and Descriptive Categories (13)
- Windows (13)
- Linux (7)
- Mac (5)
- BSD (3)
- Modern (3)
- Android (1)
- Embedded Operating Systems (1)
- Audio & Video
- Business & Enterprise
- Home & Education
- Science & Engineering
- Security & Utilities
- System Administration
Education and training timetabling software program12 weekly downloads
Description and detailed explanation on Fourier Transform, some FFT, LPC etc. Runable project demonstrates DCT transform on continuous audio, show and edit audio source with different zooming and view.3 weekly downloads
This is an open source SWF authoring library with C++ class interface. Supports flash movies generation up to version 3.2 weekly downloads
Network slow but you don't know the cause? Use Bandwidth Analyzer Pack (BAP) to monitor and analyze network bandwidth performance and traffic patterns. With BAP you can identify which users, applications, and protocols are consuming the most bandwidth. You can also monitor Wireless LAN Controller traffic to see what applications and clients are using your wireless network. Try it free for 30 days!Advertisement
A tool to extract BHPS individuals with ANY variable form ANY wave (1991-2003). It create lifepaths, for further research.
BioWarefare is a turn based strategy game were the defending immune system, of the host body, must fight off the attacking germs.
The future of information technology will be based on controlling the flow of natural light. This project is an attempt to establish the code (or software) that will enable this to happen. It involves rewriting an OS from the ground up.
Major looseless compression algorithms library and documentation. First project: Arithmetic, Huffman, LZ77, LZ78, LZW, RLE. Second project reimplements Deflate. Documentation explains major Entropy Compression Methods.
This program is designed to be used in the FIRST robotics competition FRC2007. However it can also be adapted to be used in future years. The program stores information in an excel spreadsheet, which allows for deployment on PDA's as well as printed out
Easily access more than 100,000 products and tools with our robust search engine. Manage your entire IT lifecycle from purchase to renewal all in one place — so you can get more done faster.Advertisement
Generates prime numbers. This program finds primes by checking to see if the modulus of the current number is equal to 0 for any previously found primes up unitl the square root of the number.
SiteJukeBox will be an Office/Home MP3 player, deployed in a Client/Server enviroment, where clients will be able to remotly choose MP3 files and the Server will maintain a unique queue for playing the MP3 files.
The Tinikling Labanotation Editor
Helpful tools for the college students. Eg. a java alarm clock playing any playlist you want, a tool to create a MLA style bibliography entry given a URL, etc.
Project allow create excel report from a template. This template describes header, footer, report header, report footer, groups, detail, fomula
ThousandEyes extends visibility across corporate networks as well as the public Internet, helping to solve issues from the branch through MPLS links and SIP trunks to service provider networks. Simulate pre-deployment capacity, monitor detailed performance metrics and see how QoS settings impact call quality.Advertisement
The aim is to develop step-by-step documentation with do-yourself approach. To give enough examples to better understand the concept