Level Up Your Cyber Defense with External Threat Management
See every risk before it hits. From exposed data to dark web chatter. All in one unified view.
Move beyond alerts. Gain full visibility, context, and control over your external attack surface to stay ahead of every threat.
Try for Free
Total Network Visibility for Network Engineers and IT Managers
Network monitoring and troubleshooting is hard. TotalView makes it easy.
This means every device on your network, and every interface on every device is automatically analyzed for performance, errors, QoS, and configuration.
Control program for Undulators at the BESSYII Synchrotron
The BESSY II synchrotron is operated at the Helmholtz-Zentrum Berlin. Undulators are moveable magnetic structures that force the electron beam on a curved trajectory creating synchrotron radiation.
This project is the undulator control software.
Accent interfaces and controls systems through goals and policies
Accent (Advanced Component Control Enhancing Network Technologies) is a comprehensive tool suite that interfaces a variety of communications systems and allows these systems to be controlled through goals (high-level user aims) and policies (lower-level system rules). Accent has been applied to the domains of:
o Call Control: for telecommunications, particularly call control in Internet telephony
o Home Care: for home automation and telecare, particularly for domestic appliances...
Libraries, documentation, examples & drivers for Eagle Technology South Africa's Data Acquisition products. These include ISA, PCI, PCI Express, USB, Serial & Ethernet. Supported languages will be C/C++, JAVA, Perl, Python.