Streamline Azure Security with Palo Alto Networks VM-Series
Centrally manage physical and virtualized firewalls with Panorama
Improve your security posture and reduce incident response time. Use the VM-Series to natively analyze Azure traffic and dynamically drive policy updates based on workload changes.
Learn more
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Software from LoCI Laboratory is devoted to information logistics, the study of the flexible coscheduling of the physical resources that underpin computer systems: storage, computation, and data transmission. We use IBP, L-Bone, exNode and LoRS.
A face tracking system for user interface control and development.
This software is designed to determine face position and orientation in real time using an inexpensive webcam, allowing navigation of a GUI using head movement.
TacitPixel is a scalable C++ framework for building application prototypes for interactive collaborative VR/AR applications. It provides a number of features that make prototyping fast and portable.
TacitPixel is the successor of the TAP and Twisted Pair engines.
Generate interest, access liquidity without selling, and execute trades seamlessly. All in one platform.
Geographic restrictions, eligibility, and terms apply.
Software for a van eck phreaking device. Please use to test security only.
<a href="http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci550525,00.html">Here</a>'s an explanation if you don't know what van eck phreaking is.
This is an application that streams data from the Microsoft Kinect or cameras like it over a network. The program is Intended to be used in robotics applications where the controller cannot use such cameras directly due to hardware/software limitations--such as lacking usb ports or appropriate drivers--or in situations where the camera is not in close proximity to the device that needs to access it. Given that the controller can accept data from over the network, another embedded controller...