With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Go From AI Idea to AI App Fast
One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
OS independent implementation of the Trusted Network Connect (TNC) specification from Trusted Computing Group (TCG). Functions for loading and communicating with TNC plugins, sample IMC and IMV plugins, TNCCS-XML support on Windows, Linux, Mac, *BSD
The OLSRd software as available from www.olsr.org is extended to take into account the cost of each available link. Link cost is expressed in terms of ETT (Expected Transmission Time), taking into account not only ETX but also medium speed (bits/second).
The goal of this project is to develop a framework to test and measure the performance of IEEE 802.11 based devices. Currently we aims to address the issues related to protocol conformance testing for a device.
software to capture 802.15.4 packages from the air and show all frames decoded with ZigBee Pro specification. chipcon cc2420 board is supported, loading Daintree and Chipcon capture files. Linux and windows are tested to built.
This educational software simulates an Ad-hoc network with AODV algorithm, it uses a high level view and only works in Routing layer. it has a user-friendly graphical user interface and has been written in java language.
UDAE allows developers to access data both
locally and over WSN from a variety of sources, such
as sensors, communications links and platform components in a
unified manner.
btp2p stands for Bluetooth p2p and it is a collection of java classes for p2p networks over Bluetooth. Useful for CLDC multiplayer games and other applications with extendable design for layered protocols. HuNt is a chatroom midlet based on btp2p.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Access Point Management Open System, es un prototipo de software desarrollado para el descubrimiento, configuracion y captura de eventos en puntos de acceso de la familia Aironet de Cisco y 3Com
RUNES is a cross-platform, component-based middleware framework allowing for dynamic reconfiguration of functionality. Its lightweight implementation spans powerful nodes like PDAs and PCs, as well as tiny embedded devices.
A feedback-enhanced framework for routing in wireless sensor networks. Speeds up the process of implementing routing techniques. Enables piggybacking of routing information on data packets. Written for the Omnet++ simulator and the Mobility Framework.
Wep key changer (wepkc) is a client/server application that allows you to protect your ad-hoc (point to point) Wireless network when you are unable to use (due to software or hardware limitations) sophisticated protocols like WPA.
CartoWifi is a collection of php classes for wireless usage : displaying maps, computing distance between 2 nodes, link profile, user maxtrix with visibility checking and many else. keywords : php wifi wireless cartography maps GIS
CAMA (Context-Aware Mobile Agents) is a middleware for supporting mobile agents coordination. It is based on Linda-style coordination and provides numerous extentions for interoperability and fault-tolerance. It supports portable platforms such as PDAs.
This is a Java implementation of the driver for communicate with a ZigBee network. This driver has the capabilities to create a communication with a Coordinator node, discover the nodes on the ZigBee network, receive and send command to any of this nodes
Nubric (Near-real-time user behaviour and resource interaction control) is a framework for security and authentication-related modules written in Java. Its origin focus lies on network monitoring, dynamic, transparent firewalling and traffic control.