With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
This is a Java implementation of the driver for communicate with a ZigBee network. This driver has the capabilities to create a communication with a Coordinator node, discover the nodes on the ZigBee network, receive and send command to any of this nodes
JSleuth is a system base lining collection tool. The primary purpose of Sleuth is to gather and/or develop topographical information and attributes about specified directories and files in a manner conducive to allow the baseline to be compared against.
A server network is created where if a new server is introduced into the network, it seamlessly integrates with the existing ones in a way that is not made known to the users of the service - web apache servers are used to process client request.
Nubric (Near-real-time user behaviour and resource interaction control) is a framework for security and authentication-related modules written in Java. Its origin focus lies on network monitoring, dynamic, transparent firewalling and traffic control.
Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
This Project intends to create an open community for Students in Vietnam and all over the world. It includes many small communities that use a common services such as free SMS, free tickets etc.,
Tomcat lightweight monitor can obtain the runtime thread information of Tomcat server even if its load is very heavy.
Users can set different interval and show the data by web browser or JMX client periodically.
Remote Web Logger is a remote web transaction logging daemon. It operates by passive monitoring of web server traffic to translate web session data to transaction log entries that are written to standard log services such as syslog.
Streamline Azure Security with Palo Alto Networks VM-Series
Centrally manage physical and virtualized firewalls with Panorama
Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
Hyper-M is a bluetooth based DHT peer-to-peer infrastructure for J2ME (CLDC1.1/ MIDP2.0) enabled handphones. Hyper-M allows the user to create a peer-to-peer network and share and retrieve files on this network. Has been tested mainly on Nokia handphones
It intends to address situations of indoor short‑range distances in which there are 2 types of entities: terrestrial radars and tiny flying UAVs ("nano drones").
SipSpy is a distributed monitoring tool for SIP networks. SpyAgents run on each of the nodes to be monitored, and a SipSpy connects to each of these nodes, receiving information and displaying it in real-time for all the SIP packets monitored.
SimpleLogViewer is Java 2 based GUI application that display logging data. Can read a file or listen over a TCP socket. Use plugins/embedded scripts to Hide, Rewrite, Colorize lines of log.
Simple GUI tool for creating and manipulating WSN topologies
TOPO is a simple tool that allows the user to create and manipulate arbitrary Wireless Sensor Network (WSN) topologies without worrying about the anomalies that could arise using a text-base topology description. It is fast and easy to use and can accelerate small scale projects such as network simulation.
The tool is still undergoing development stage and is open to extension. One the candidate component to be soon integrated is a WSN discrete event simulator.
Proof That Carma Always Gets You Back Nvidia / Cuda Developer Directed Of Course To The Confusion And Scare Tactics Of Haters This Only Gets Better And Tighter And Even More Creative The Design Feed Of Sound The Whole Idea
jvmShare is aiming to provide a server-client system that shares resources across the network. Since it is written in Java, clients shares their resources by providing their JVMs to the central server. The server will schedule tasks to these clients.
This is a new generation of SQL (Structured query language) Server which is targeted to serve on a Virtual Appliance. Hybrid SQL Server is targeted to run on VirtualBox from SunMicrosystems.
WebLOQ IO is a Java NIO framework which allows for tens of thousands of concurrent TCP/IP connections through a very small thread pool (assuming proper OS and network settings). There is built in support for SSL and non-SSL connections.
The goal of this research work – is construction of infrastructure of service-oriented distributed system, performing the clustering of images saved on several databases in network.
Monitoring tool with support to Websites, RSS, Webservices and Databases. Has notifications by email and RSS and you can access metrics like availability, latency and load time by a web-based GUI. Runs standalone with an embedded HTTP server.
This project is a collection of three different programs, regarding: 1) a program to include context-sensitive ranking when querying on a database, 2) a program for estimating relative importance in networks. 3)Search of services in a sensor network
Infect is a network traffic classification tool, that classifies TCP protocols. The classification is based on ML techniques. Scen: Train/Recognize arbitrary protocols (SSH, HTTPS..), Detect policy violations (e.g. tunnels)