Showing 4 open source projects for "java proxy server"

View related business solutions
  • Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.
 Icon
    Award-winning proxy networks, AI-powered web scrapers, and business-ready datasets for download.


    How the world collects public web data

    Bright Data is a leading data collection platform, enabling businesses to collect crucial structured and unstructured data from millions of websites through our proprietary technology. Our proxy networks give you access to sophisticated target sites using precise geo-targeting. You can also use our tools to unblock tough target sites, accomplish SERP-specific data collection tasks, manage and optimize your proxy performance as well as automating all of your data collection needs.
    Learn More
  • All Things Performance and Partner Marketing, All in One Place Icon
    All Things Performance and Partner Marketing, All in One Place

    Track calls, leads, and clicks without the manual work

    Automatically tie revenue back to campaigns, channels, publishers, and networks through marketing attribution. Spend less time juggling reports, and more time optimizing for growth by using a single operating solution for partner and performance marketing.
    Learn More
  • 1

    Ignition tag generator

    Generate tags for Ignition 8.1.X

    This tool is a lightweight Java-based generator that creates JSON files with a hierarchical Folder/UDT/Tag structure. It’s designed to help you quickly populate your Ignition tag system by pre-defining common tag properties. With an easy-to-use Swing interface, you can build and manage your tag hierarchy, then export it as a ready-to-import JSON file. Requires Java 8 or later. Make sure JAVA_HOME or PATH includes your Java directory. No affiliation with Ignition/I.A.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Accent Tool Suite

    Accent Tool Suite

    Accent interfaces and controls systems through goals and policies

    ...Accent has been applied to the domains of: o Call Control: for telecommunications, particularly call control in Internet telephony o Home Care: for home automation and telecare, particularly for domestic appliances and devices to support home care o Sensor Networks: sensor networks, particularly managing wind farms However, the approach is generic and extensible for managing other kinds of systems. Accent is essentially software. As most of Accent in in Java, it needs at least a Java Runtime Environment but more likely a Java Software Development Kit. To interact with the real world, Accent needs relevant hardware such as a communications server (softswitch) or home automation equipment.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Oscar SCADA

    Open source, web based, SCADA system written in PHP/Javascript & Java

    Oscar is a web based Supervisory Control And Data Acquisition System, providing polling, reporting, charting, and alarm functionality. Enabling users to monitor and mange microcontroller devices in an automation system. The UI is web based and written in PHP, the server daemon componenet is written in Java and uses MySQL for storage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This is an open, cross platform SCADA system. SCADA stands for Supervisory Control and Data Acquisition, and is used to create software front-ends to control processes in industry. Created in Java, it has a headless server and uses Swing GUI controls
    Downloads: 0 This Week
    Last Update:
    See Project
  • Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes. Icon
    Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes.

    Track your GenAI risk, run multichannel deepfake simulations, and engage employees with incredible security training.

    Assess how your company's digital footprint can be leveraged by cybercriminals. Identify the most at-risk individuals using thousands of public data points and take steps to proactively defend them.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB