Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Go From AI Idea to AI App Fast
One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Tristero is a framework for creating distributed peer-to-peer file sharing applications. It uses standard technologies for each component, reducing the work of implementing a particular network architecture to the novel aspects of that system and eliminat
The goal of the project is to develop Role Based Access Control software which can be used in any application. The software can be deployed as a server which can cater to multiple applications. Rules can be written for fine grained access control.
DNA is an open, flexible and extensible deep network analyzer software server and software architecture for gathering and analyzing network packets, network sessions and applications protocols, passively off enterprise class networks.
WebScarab for Eclipse is an extensible framework for analyzing applications that communicate using the HTTP protocol. It includes an HTTP monitor and an HTTP proxy for recording all messages between your machine and remote servers.
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
The aim of this project is to provide convenient ways for a rapid development of java enterprise applications.
To achieve this goal the project provides a collection of libraries which carry out commonly used tasks and/or ease technological implications
Execution monitor for JavaApplications.<br/>
BERSERK implements the Intercepting Filter design pattern. <br/>
Allows composing and runtime editing of execution flow and intercept services with access control, logging or any user-defined filters.
This project provides an interface to Sun's JCE (Java Cryptographic Extensions) as a JSP taglib. It brings strong encryption algorithms such as AES and Blowfish to your JSP applications. It uses the bouncycastle.org cleanroom JCE 1.2.1 implementation as
SWM (Secure WebMail) is an applet that provides confidentiallity and authentication in webmail applications using SHA/RSA algorithms. It can accompany virtually every webmail application, but comes with a plugin for squirrelmail and can run standalone.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
AuthServlet is a Java Servlet (and JSPs/TagLibs) which provides a simple pluggable authentication and role-based authorization service. It can be easily incorporated into any Servlet-based web applications.
The MuPPIT is cross-platform, open source Multi-Purpose Peons Internet Toolkit written in Java and C++, providing a collection of new, useful applications for the average internet user.
The Filters project team are building API's which will filter malicious input to applications that is used to launch various attacks. The filters will sanitize input rendering it harmless and detect specific attacks. This project will develop imple
An Experimental Platform for Secure Peer Services, QARE uses a decentralized trust model, a Public Key Infrastructure and provides single logon for multiple applications running across multiple systems. WAR files are used to add applications.
Next generation reverse proxy : provides authentication and authorization services for all incoming HTTP traffic, in addition to offering transparent web SSO to protected applications.
The Registry Server (jUDDI) offers a mechanism for humans or software applications to advertise and discover Web services. The Java Web Services Developer Pack (Java WSDP) Registry Server implements Version 2 of the Universal Description, Discovery and I
Malabar is a simple, context-agnostic authentication library for Javaapplications. It strives to be equally usable in J2EE/Web, GUI, and other applications requiring user authentication.
The Shibboleth Proxy provides an intermediate filter to the Shibboleth authentication system, enabling Shibboleth unaware applications to connect automatically and make use of Shibboleth protected HTTP-based service providers.
The project is being migrated to http://code.google.com/p/ciform...
IMPORTANT : The project is now being hosted at http://code.google.com/p/ciform
Plug'n Auth is an API providing easy integration of different authentication mechanisms into web applications. Within a few steps web admins will be able to change both the authentication backend and the logon frontend at any time with no further effort