The full-stack observability platform that protects your dataLayer, tags and conversion data
Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.
Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast.
No manual QA. No unreliable data. Just data you can trust and act on.
Learn More
Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
High performance, production quality STUN server and client library
New version 1.2. This is the code to STUNTMAN - an open source STUN server and client code by john selbie. Compliant with the latest RFCs including 5389, 5769, and 5780. Also includes backwards compatibility for RFC 3489. ICE and WebRTC ready.
Version 1.2 compiles on Linux, MacOS, BSD, and Solaris. Supports the STUN protocol on both UDP and TCP for both IPv4 and IPv6.
The OSP Toolkit is a client side implementation of the ETSI OSP VoIP Peering protocol (ETSI TS 101 321). The OSP Toolkit project was begun in 1998 and the code has been incorporated into many commercial and open source VoIP products.
Java version of Dialogic's SwitchKit API. This API is actually a more "Java Centric" API, with listeners, filters, and a very extensible and modular framework that finally uses JNI to access the native libraries provided by Dialogic.
The purpose of this project is creating a plugin for <a href="http://www.ethereal.com/">Ethereal</a> that will enable it to decode ITU-T Recommendation H.323 traffic. The implementation is based on <a href="http://www.openh323.org">OpenH323</a> code
Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.