Showing 2 open source projects for "separation"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • All-in-one security tool helps you prevent ransomware and breaches. Icon
    All-in-one security tool helps you prevent ransomware and breaches.

    SIEM + Detection and Response for IT Teams

    Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
    Learn More
  • 1
    Curve

    Curve

    Curve is a sandbox project hosted by the CNCF Foundation

    ...Now it's hosted at CNCF as a sandbox project. The performance, mixed, capacity cloud disk or persistent volume of virtual machine/container, and remote disks of physical machines. High-performance separation of storage and computation architecture: high-performance and low latency architecture based on RDMA+SPDK, supporting the separation deployment structure of various databases such as MySQL and Kafka.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    Copy Milk - a console program on ideology reminiscent robocopy but it has a number of significant innovations and differences: + Separation of keys for files and folders + Ability to use the same key several masks at the same time + Copy rights for files and folders separately + Rename files and folders in the backup process with fine-tuning and regular expressions + Transliteration of names of files and folders specific to a 9-major languages ​​post-Soviet space + Compression and decompression of files when copying + Ability to encrypt and decrypt the files when you copy more than 12yu different algorithms + Combination of compression and encryption and decryption respectively, and a release of files for copying + Creation mirror copies of folders and subfolders + Ability to execute an external program for each successfully processed file by specifying it in the parameters of the last run (eg. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next