Showing 5 open source projects for "algorithm"

View related business solutions
  • Your top-rated shield against malware and online scams | Avast Free Antivirus Icon
    Your top-rated shield against malware and online scams | Avast Free Antivirus

    Browse and email in peace, supported by clever AI

    Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
    Free Download
  • Simplify IT and security with a single endpoint management platform Icon
    Simplify IT and security with a single endpoint management platform

    Automate the hardest parts of IT

    NinjaOne automates the hardest parts of IT, delivering visibility, security, and control over all endpoints for more than 20,000 customers. The NinjaOne automated endpoint management platform is proven to increase productivity, reduce security risk, and lower costs for IT teams and managed service providers. The company seamlessly integrates with a wide range of IT and security technologies. NinjaOne is obsessed with customer success and provides free and unlimited onboarding, training, and support.
    Learn More
  • 1
    Use of Michael Rabin's Information Dispersal Algorithm to provide secure, dispersed storage in a networked environment. For full download, please get both Math-FastGF2 and Crypt-IDA releases under the files link. See project wiki for more information.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    rrd-watcher is an intelligent alerting system that detects and alerts on abnormal data found in RRD files. Alerts can be raised by using the rrdtool Holt-Winters forecasting method, or with the rrd-watcher detection algorithm.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    vuVolume is a framework for volume rendering algorithms in C++. When creating a new rendering method in vuVolume it is possible to just concentrate on the actual algorithm and let the framework take care of the more administrative tasks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    N-stage worm propagated via SSH. It executes commands in a given list of hosts and copies files to them with rsync. The paths for its propagation to the cluster are configurable. It offers a scalable/reliable transport API thanks to its adaptive algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 5
    PAM_PKA is a a PAM authentication module, enabling the use of cheap removable media for token authentication. PAM_PKA uses the DSA algorithm to perform public key authentication to verify the identity of the user requesting access rights.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.