Showing 4 open source projects for "order"

View related business solutions
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • Fully Managed MySQL, PostgreSQL, and SQL Server Icon
    Fully Managed MySQL, PostgreSQL, and SQL Server

    Automatic backups, patching, replication, and failover. Focus on your app, not your database.

    Cloud SQL handles your database ops end to end, so you can focus on your app.
    Try Free
  • 1
    HelenOS

    HelenOS

    A microkernel-based multiserver operating system written from scratch.

    ...HelenOS does not aim to be a clone of any existing operating system and trades compatibility with legacy APIs for cleaner design. Most of HelenOS components have been made to order specifically for HelenOS so that its essential parts can stay free of adaptation layers, glue code, franken-components and the maintenance burden incurred by them.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    Uplos

    Uplos

    linux 32bit old hardware opensource developement retro rpm pclinuxos

    Following to the end of the 32bit version of PCLinuxOS, a consistent number of users have lost an important possibility to keep their machines on work.Old hardware often doesn’t support 64bit, often cannot face a complete reinstallation for any reason, surely a 64bit system is heavier than the correspondent 32bit.Therefore, once acknowledged what was going to happen, a (very, very) small group of alleged developers started the present project in order to maintain alive that distro. They had to save the last updated repo, to improve what happened thereafter in the 64bit version and to recompile that in 32bit.So said it doesn’t look hard but when recompiling is made on several hundreds of packages by 2 or 3 persons of goodwill, it becomes a considerable job.A job that doesn’t finish because a very strenght of pclos is in being a rolling distribution and Uplos aspires as well to be ever on progress.Since we have a special consideration for old hardware,we started with light DE.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    USE secure operating system

    USE secure operating system

    a secure, open source OS for use inside USEagency facilities

    ...It will also have fined-tuned firewall capabilities, with a default policy of deny all inbound except HTTP HTTPS and SSH. Web browser will be sand boxed from other parts of the OS. In order to access saved passwords, cache, cookies, ect in web browser, username/password are required. Downloaded files (and any other files entering the system) will be subjected to both an exception-based and signature-based virus scan. After that, they will be placed in a leveled security storage space, each more secure--with the most secure being 50. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Linux distro to run under Google's NaCl

    Linux Distro to run under Google's NaCl Sandbox

    A challenging project that attempts to get a Linux distro to run under Google's NaCl. NaCl untime environment is very different from traditional posix systems. There is several hurdles to overcome in order to get a standard linux distribution to run under NaCl. There is a library called nacl_io in the Google NaCl sdk. It mimics the function of a posix files and sockets on top of ppapi. Similarly in naclports there is a crude nacl-spawn library which mimics processes by creating multiple nacl modules with javascript acting as a sort of "kernel". ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB