You Might Also Like
Our Free Plans just got better! | Auth0 by Okta Icon
Our Free Plans just got better! | Auth0 by Okta

With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
Try free now
Bright Data - All in One Platform for Proxies and Web Scraping Icon
Bright Data - All in One Platform for Proxies and Web Scraping

Say goodbye to blocks, restrictions, and CAPTCHAs

Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
Get Started
Tigerpaw One | Business Automation Software for SMBs Icon
Tigerpaw One | Business Automation Software for SMBs

Fed up with not having the time, money and resources to grow your business?

The only software you need to increase cash flow, optimize resource utilization, and take control of your assets and inventory.
Learn More
Business Continuity Solutions | ConnectWise BCDR Icon
Business Continuity Solutions | ConnectWise BCDR

Build a foundation for data security and disaster recovery to fit your clients’ needs no matter the budget.

Whether natural disaster, cyberattack, or plain-old human error, data can disappear in the blink of an eye. ConnectWise BCDR (formerly Recover) delivers reliable and secure backup and disaster recovery backed by powerful automation and a 24/7 NOC to get your clients back to work in minutes, not days.
Learn More
Cybersecurity Solutions to Protect, Detect and Respond Against Cyberattacks Icon
Cybersecurity Solutions to Protect, Detect and Respond Against Cyberattacks

Kroll's elite cyber risk experts deliver end-to-end cyber security services for organizations in a wide range of sectors, across the globe.

From system upgrades or a move to the cloud … to applications meant to improve the customer experience … and to integral third-party relationships, one misstep can cascade into IP theft, wire fraud, ransomware, data breaches and more; not to mention regulatory action, civil litigation and reputational damage. That’s why we’ve structured end-to-end solutions to manage the entire threat lifecycle.
Learn More

Additional Details for Smart-M3

Operating Systems

Symbian OS, Linux, BSD, Maemo

Intended Audience

Information Technology, Science/Research, Telecommunications Industry, Developers

User Interface

Non-interactive (Daemon)

Programming Language

Python, C++, C

Registered

2009-09-25

Last Updated

Categories

Database Engines/Servers, Object Brokering, Semantic Web

Maintainers

balandin77, galov, hannlain, ioliver, jhonkola, jpluoma, kalexey, kirill-krinkin, lmv1, otyrkko

Keep Me Updated!