With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Level Up Your Cyber Defense with External Threat Management
See every risk before it hits. From exposed data to dark web chatter. All in one unified view.
Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
NetworkX is a Pythonpackage for the creation, manipulation, and study of the structure, dynamics, and functions of complex networks. Data structures for graphs, digraphs, and multigraphs. Many standard graph algorithms. Network structure and analysis measures. Generators for classic graphs, random graphs, and synthetic networks. Nodes can be "anything" (e.g., text, images, XML records).
An interactive NVIDIA-GPU process viewer and beyond
nvitop is an interactive NVIDIA device and process monitoring tool. It has a colorful and informative interface that continuously updates the status of the devices and processes. As a resource monitor, it includes many features and options, such as tree-view, environment variable viewing, process filtering, process metrics monitoring, etc. Beyond that, the package also ships a CUDA device selection tool nvisel for deep learning researchers. It also provides handy APIs that allow developers...
Master/node to gather and graph "everything" on your systems using Tobi Oetiker's rrdtool. It can optionally warn your surveillance software. This software package was originally called LRRD. The project. Please see http://munin-monitoring.org/
TCNs exhibit longer memory than recurrent architectures with the same capacity. Performs better than LSTM/GRU on a vast range of tasks (Seq. MNIST, Adding Problem, Copy Memory, Word-level PTB...). Parallelism (convolutional layers), flexible receptive field size (possible to specify how far the model can see), stable gradients (backpropagation through time, vanishing gradients). The usual way is to import the TCN layer and use it inside a Keras model. The receptive field is defined as the...
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Zero Install is a decentralised cross-distribution software installation system. Create one package that works everywhere! With dependency handling and automatic updates, full support for shared libraries, and integration with native package managers
Beta package released!
Network Analyzer for lighting protocols like Art-Net, ACN, MA-Net and Compu-Net. Allows to display DMX data and discovers connected Desks
The WiKID Strong Authentication System is a public-key based two-factor authentication system. It is a flexible, extensible, and secure alternative to tokens, certs and passwords. Application & API support exists for Java, ASP, PHP, Ruby, OpenVPN, TACACS+, etc.
Read our eGuide on how to setup your network with two-factor authentication: http://www.wikidsystems.com/learn-more/two-factor-authentication-white-papers
The package-item can be written in any language that is supported by the Programming-Language-Micro-Kernel support.
It even supports running multiple programming languages in a single piece of software.
Supported Languages are: (C,C++,C#,VB.NET,Java,Python,Ruby,Perl,PHP,Tcl or GO)
> Strategy: It takes 4 years to write a programming-language, but it only takes 4 weeks to insert a micro-kernel.
CTypes-based python bindings to the GSASL library (www.gnu.org/software/gsasl ). This package provides a parser that generates python code w/ types checking and more pythonish feel than just plain usage of the library through ctypes.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
DOGTOWN - Free Software & Tools for administrators ||| please read the Release Notes or docs @ http://dogtown.mare-system.de for a description of each package
Dig_it is python widget, it search some dns request as fronted domain name server client based on a backend package named dnspython "http://www.dnspython.org/", also, wxpython is needed as depency you can find it here http://www.wxpython.org/.
pyip is a Pythonpackage offering assembling/disassembling of raw ip packet, including ip, udp, and icmp. Also it includes 2 utilities based on raw ip, traceroute and ping.
DAXFi is a Pythonpackage that helps configure several different kinds of firewalls in a consistent way. The rules are described in XML. It comes with a Pythonpackage, useful to build other applications and includes some useful example programs.
vpnDialer is a gtk2+ gui for the vpnc package. It's a simple and easy to use program to create and disable connections. It can also be used to create and modify vpn configuration profiles.
RSS Proxy is software package written in Python. It can run on both Windows and Linux. It can either run as a proxy (i.e., RSS Reader get data through it), or run as a web server (i.e., there is a web interface for both common users and administrators).
PyVpn is a software for management VPN connections for GNU/Linux written in Python using pySqlite and pyGtk. With DB support and Wi-Fi support too. It is based on the "iwconfig" utilities and the "ppp" package.
A Pythonpackage providing an API for access to network devices such as Cisco routers and switches. It allows easy access to devices for the purpose of configuration, command execution, and other tasks.