Teradata VantageCloud Enterprise is a data analytics platform for performing advanced analytics on AWS, Azure, and Google Cloud.
Power faster innovation with Teradata VantageCloud
VantageCloud is the complete cloud analytics and data platform, delivering harmonized data and Trusted AI for all. Built for performance, flexibility, and openness, VantageCloud enables organizations to unify diverse data sources, run complex analytics, and deploy AI models—all within a single, scalable platform.
Learn More
The All-In-One Google Workspace Management Tool for IT Admins
Our advanced administration makes adding, deleting, suspending, and de-provisioning users simple and quick.
gPanel by Promevo streamlines administration, security, and user management, giving organizations full control over their Google Workspace.
System performance data management and monitoring tool. It gather performance data from nagios or generic source for make custom graphs, reports and "brainy" analysis. It's developed in Java 1.5
DuMP3 is a duplicate and similar file finder. It finds exact duplicate binaries by hash, similar text files by substring content, images (JPG, BMP, GIF, PNG, etc) by color and audio files (MP3, WAV, OGG, etc) by wave data. Future: fonts, video.
Streamline your legal processes and ensure compliance with our eDiscovery company.
DWR eDiscovery allows legal professionals to process, analyze, review, and produce documents that are relevant to litigation and other legal disclosure obligations. Our tools allow easy ingestion and analysis of client and opposing party documents using a comprehensive set of document review features including AI search, keyword search, keyword highlighting, metadata filtering, marking documents, privilege log management, redactions, and a range of analysis tools to help users best understand their document corpus.
Watchdog is a Java performance monitoring and tuning framework. It is suitable for production environments allowing flexible auditing of performance data for later analysis by a comprehensive set of tools.
iROS is a meta-operating system for technology-rich "interactive rooms". The core components (Event Heap, DataHeap, iCrafter) provide communication, data storage, and service management for an iRoom.
OpenDCM is an Open Source Data Center Management project. System audits, rapid file/software deployment, os provisioning, reporting and more. Automate repetitive tasks and simplify the work of sysadmins in large scale data centers.
A configurable knowledge management framework. It works out of the box, but it's meant mainly as a framework to build complex information retrieval and analysis systems. The 3 major components: Crawler, Analyzer and Indexer can also be used separately.
XSDB XML is to DATA as HTML is to DOCUMENT. Publish and combine data as easily as HTML format and web browsers publish and view documents. Implementations in Python, javascript, java, C#/.NET.
For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces
Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
GLTMon is a J2EE Web application that gathers data from your network devices (such as, routers and switches) via SNMP and saves the data into a MySQL database for reporting and analysis.
DNA is an open, flexible and extensible deep network analyzer software server and software architecture for gathering and analyzing network packets, network sessions and applications protocols, passively off enterprise class networks.
Uberviewer is a java/swt log processor for Uberlogger (a kernel-based observatory). It allows real-time analysis of a remote OS, including process and I/O monitoring.
This tool is intended to be helpful for security researchers and malware analysts.
Bootchart is a tool for performance analysis and visualization of the GNU/Linux boot process. Resource utilization data and process information are collected during the boot process and can later be displayed in a PNG, SVG or EPS chart.
The MP4Free project provides a simulation, analysis and exploration platform for multi-processor system-on-chip applications at variable level of abstraction, providing also a comprehensive component library.
Healthcare Xchange Protocol for interoperative communications. Data exchange/transfer, platform independent,XML-RPC, HL7, SOAP, EDIFACT, simple,easy, authenticated, secure, transparent, no geo-restrictions, open sourced, peer reviewed, collab development
GILoT is an interpreting and formatting log tail:er. As each log entry is matched and formatted against customizeable rules, only relevant data is parsed.
GILoT features, atm, two separate user interfaces, a console UI and an ncurses/charva TUI.
ZATreeX is a data manager with two control panels. The difference with conventional data managers is its ability to manage any tree structured data:you just have to implment a java interface. It is also able to extend it functionality (another interface)
The Internet Censor is a multi-platform, Internet clustering program, for which the resulting data will be used in the creation of a non-profit content-filtering Internet Search Engine for children.
Cherry is a web based Java application built around RRDtool and used for monitoring and trend analysis of SNMP collected data. Extensive per component configuration and graphing abilities make this a useful tool for the network administrator.
idyuts is \"I Dare You to Use This Shell\"; a pre-hibernate approach to replacing an ORM written with jython functors into a pure-Java language command pattern. The \"pipeline codegen artifacts\" are simple IoC templates, and trivial to adapt
The Secure Remote Log Monitor (SRLM) project provides client and server
utilities that collect application or system log files from multiple systems over an untrusted network onto a central server for analysis and action.
xjnm is a java daemon that gathers numbers from arbitrary sources (e.g. cpu usage) and can store it on arbitrary storages (e.g. a jdbc database) for later analysis or react in arbitrary way to the data collected (e.g. inform an administrator by e-mail).
Transparent file encryption performs real-time I/O encryption and decryption of the files in any block data with 16 bytes. The encryption uses a 256 bits symmetric key to encrypt or decrypt the data with AES encryption algorithm. Auto file encryption protects data "at rest", meaning the transparent data and files encryption. It provides the ability to comply with policies which can be applied by users, processes and file type. This allows only authorized users and processes to access the...
SimpleLogViewer is Java 2 based GUI application that display logging data. Can read a file or listen over a TCP socket. Use plugins/embedded scripts to Hide, Rewrite, Colorize lines of log.