With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Get Avast Free Antivirus | Your top-rated shield against malware and online scams
Boost your PC's defense against cyberthreats and web-based scams.
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
aRSync is "Another RSync" and provides a pure java implementation of the rsync algorithm. This implementation is intended to be ready to use for file transfer, to be easy to extend for further use cases and - most important - to become productive.
JMS/Joram implementation of the Bully election algorithm. It is a library to be used by a process' implementation to make it transparently manage coordinator's elections, while it carries out business logic. A sample application is included.
The project will develop an in – memory object cache utilizing the LRU (least-recently-used) algorithm. The cache will store the objects that are most accessed within a fixed size memory pool. Thus system is keep statistics and calculates tradeoffs.
Simplify IT and security with a single endpoint management platform
Automate the hardest parts of IT
NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers.
The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support.
This educational software simulates an Ad-hoc network with AODV algorithm, it uses a high level view and only works in Routing layer. it has a user-friendly graphical user interface and has been written in java language.
XinDiff is a diff utility implementing WinDiff like GUI by an improved LCS algorithm. The key feature in addition to WinDiff is in-place comments for code review.
This is a network based text search tool. The Network part consists of Client and Server side .class files. The text search algorithm has been implemented in C. On client side type SearchClient ip(server) string
Now available in even more cloud regions across AWS, Azure, and Google Cloud.
MongoDB 8.0 brings enhanced performance and flexibility to Atlas—with expanded availability across 125+ regions globally. Build modern apps anywhere your users are, with the power of a modern database behind you.
StrMatch is a simple java program, created for educational purposes, that allows user to test a great part of string matching algorithms.
An intuitive user interface shows each algorithm step accurately...
distDES is a Java RMI-based application which manages load balancing on heterogeneous clusters. Development will extend the theoretical initial implementation to include clustered Rainbow Table generation and encryption algorithm collision detection.
IslandEv distributes a Genetic Algorithm (like <a href="/projects/jaga">JaGa</a>) across a network (see <a href="/projects/distrit">DistrIT</a>) using an island based coevolutionary model in which neighbouring islands swap migrating individuals every
A user-centric Java Mailet for the Apache James mail server (a Java mail server) for the purpose of filtering spam using a naive Bayesian algorithm. As a Mailet, the filter can act upon spam as it is received over SMTP before the user gets it.
A Java based Proxy which dynamically converts HTML from existing web applications to provide XML data and XML-RPC services without having to modify the web applications. One format implements an algorithm called the RMA discussed in a graduate thesis.
A java library to demonstrate an algorithm to coordinate First Order multi-party interactions. This algorithm could be used to implement concepts in distributed coordinated computing
including the Multi-way Rendezvous statement.
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
Its a software which can be used to simulate and emulate the mobility management in the wireless network, this implements the mobility management algorithm,
it uses the Blue tooth as a communication media between a wireless terminal and