Enterprise manufacturers and distributors requiring a solution to manage and execute complex processes
Efficiently executing the complex processes of enterprise manufacturers and distributors. Infor M3 is a cloud-based, manufacturing and distribution ERP system that leverages the latest technologies to provide an exceptional user experience and powerful analytics in a multicompany, multicountry, and multisite platform. Infor M3 and related CloudSuite™ industry solutions include industry-leading functionality for the chemical, distribution, equipment, fashion, food and beverage, and industrial manufacturing industries. Staying ahead of the competition means staying agile. Our new capabilities bring improved data-driven insights and streamlined workflows to help you make informed decisions and take quick action.
Learn More
Create stunning, professional email signatures in minutes
For companies looking to create, assign and manage all their employees email signatures and add targeted marketing banners.
Create, assign and manage all your employees’ email signatures and add targeted marketing banners. Stop getting worked up about your signatures! Leverage a centralized interface to easily create and manage the email signatures of all your employees. Take advantage of each email to broadcast and amplify your brand. Letsignit helps you regain control over your digital identity. Harmonize 100% of your employee’s email signatures in just a few clicks! 121 professional emails are received and 40 are sent every day by an employee. With Letsignit, turn every email into a powerful communication opportunity: send the right message to the right person at the right time! Innovative more than tech, inspiring more than following. Authentic more than overrated, close more than "think big", trustworthy more than doubtful. Hands-on more than complex, available but yet premium, fun but yet expert.
Piper is a daemon used to redirect streams. Input and output can be one of: stdin, stdout, fifo, program. It simply does the same as shell's "<", ">", "|" with a difference of: ability to re-open fifos, catch program exits/crashes and restart it.
Allows users of a Linux workstation to control which programs access the Internet. This can be done statically by listing them in a file or dynamically via a GUI dialog box that appears when a new program attempts to connect to the Internet.
'ssh2all' is a program for sending commands simultaneously to a group of hosts
over ssh. Hosts are organized into clusters, which can then become the target
of a series of commands (or a script).
The hosts' output is finally compared and summarized.
Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of Google's scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
Flexible, secure file-transfer utility similar to rsync achieving high transfer rates for both large and small files on networks with both LANs and WANs (networks with low or high latencies). Supports interactive batch as well as scripting operation.
EZtorrent is a tool that simplifies the process of publishing content via BitTorrent. EZtorrent automates the process of generating .torrent metainfo files, as well as starting trackers and seeders.
deface-no-tnx is an anti-defacement system that monitors your Web files and notifies you about unallowed changes. It also replaces the defaced page with a standard "error" page,so that no offensive/joking content can be frauodolently added to your site
This program aims at converting LDAP schema's from different formats to other formats as good as it is possible. One example would be converting schema LDIFs to a format that can be used by OpenLDAP.
Tomahawk is a command line utility that supports high speeds bidirectional replay (300-750 Mbps) of saved tcpdump(8) files. Tomahawk is great for testing the throughput and blocking capabilities of network-based intrusion prevention
systems (NIPS).
this user friendly program is wrote for masquerade the difficulty of the administration of a freebsd machine. this application permit you of configure a dhcp server, a firewall, a natd daemon and an internet share connection, all with a simple interface.
JERC:Java Encrypted Relay Chat. Our goal is to construct a java program to allow our users to chat securely to each other. We want to make it so our users don't have to worry about they're chats being unintentionally intercepted by third parties.
Open Streaming Server is an digital media delivery. Main characteristics are: - Streaming of mp4, 3gp, WMF, QT files - Dynamic Bandwidth adaptation - Load balancing - Content distribution Technology: C++, Java and CORBA.
netadm project provides monitoring tools for network performance and network control system. the above monitoring tool is called 'npt(Network Perfermance Tool) and the above network control system is called 'gwc (GateWay Control~). npt program provide
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump, aireplay, aircrack, airdecap, and some tools to handle capture files (merge, convert, etc.).
apt-mirrors checks servers with APT repositories for bandwidth and writes best to sources.list. It is completly integrated with libapt-pkg, i.e. it uses native APT methods for fetching files.
A python program that implements the SMPP protocol and can connect to a Short Message Service Center (SMS-C) or other SMPP compliant software over a network. Generally used for sending and receiving of SMS.
Collector of the traffic on the basis of pcap-library. Data are aggregated and saved under the scheme "DetailHostMatrix Aggregation Schemes" Cisco NetFlow FlowCollector. Data are kept in the form of gzip-files or deduced in stdout.
High performance, real-time data analysis engine capable of processing from various sources simultaneously (syslog, files, sockets, etc). Triggers internal and user-defined events based on built-in and user-defined rules.
Multispoof exploits weak authentication method based on IP-MAC pairs checking, implemented frequently in Ethernet networks by ISPs. This program allows to multiply user's throughput and serves as a demonstration of spoofing effectiveness.
SWAL is a program that can launch as a service (or standalone) and monitor other services and control other programs. Written in C++ and might have some .NET components (planning on a linux port)
Netmon is a simple program for monitoring bandwidth and data usage on linux machines. It is useful for those with a broadband connections that pay for their data or have download limits.
Port lwIP and uC/OS-II on a TI C6000 DSP platform. The 10/100M ethernet was based on a DaughterCard designed by ourselves. And it has been tested on TI C6711 DSK & C6713 DSK. The schematic files of the daughtercard is also part of this project.