Tags : Browse Projects

Select a tag to browse associated projects and drill deeper into the tag cloud.

hazelcast

Compare

  Analyzed about 17 hours ago

Hazelcast is a clustering and highly scalable data distribution platform for Java. Features: Distributed implementations of java.util.{Queue, Set, List, Map} Distributed implementation of java.util.concurrency.locks.Lock Distributed implementation of java.util.concurrent.ExecutorService ... [More] Distributed MultiMap for one-to-many relationships Distributed Topic for publish/subscribe messaging Transaction support and J2EE container integration via JCA Socket level encryption support for secure clusters Synchronous (write-through) and asynchronous (write-behind) persistence Second level cache provider for Hibernate Monitoring and management of the cluster via JMX Dynamic HTTP session clustering Support for cluster info and membership events Dynamic discovery Dynamic scaling Dynamic partitioning with backups Dynamic fail-over Hazelcast is for you if you want to share data/state among many servers (e.g. web session sharing) cache your data (distributed cache) for better performance cluster your application provide secure communication among servers partition your in-memory data send/receive messages among applications distribute workload onto many servers take advantage of parallel processing provide fail-safe data management Hazelcast is pure Java. JVMs that are running Hazelcast will dynamically cluster. Although by default Hazelcast will use multicast for discovery, it can also be configured to only use TCP/IP for enviroments where multicast is not available or preferred. Communication among cluster members is always TCP/IP with Java NIO beauty. Default configuration comes with 1 backup so if one node fails, no data will be lost. It is as simple as using java.util.{Queue, Set, List, Map}. Just add the hazelcast.jar into your classpath and start coding. A test application comes with the Hazelcast distribution that simulates the queue, set, map and lock APIs. You may want to watch the following 12 minute screencast to quickly get started. [Less]

1.45M lines of code

66 current contributors

1 day since last commit

15 users on Open Hub

Very High Activity
5.0
 
I Use This

leveldb

Compare

  Analyzed about 2 hours ago

LevelDB is a library that implements a fast key-value store. Features * Keys and values are arbitrary byte arrays. * Data is stored sorted by key. * Callers can provide a custom comparison function to override the sort order. * The basic operations are Put(key,value) ... [More] , Get(key), Delete(key). * Multiple changes can be made in one atomic batch. * Users can create a transient snapshot to get a consistent view of data. * Forward and backward iteration is supported over the data. * Data is automatically compressed using the Snappy compression library. * External activity (file system operations etc.) is relayed through a virtual interface so users can customize the operating system interactions. [Less]

22K lines of code

15 current contributors

about 1 year since last commit

7 users on Open Hub

Very Low Activity
3.0
   
I Use This

Solaar

Compare

  Analyzed about 13 hours ago

Solaar is a Linux device manager for Logitech's Unifying Receiver peripherals. It is able to pair/unpair devices with the receiver, for many devices show battery status, and show and modify some of the modifiable features of devices.

24.7K lines of code

22 current contributors

2 days since last commit

3 users on Open Hub

High Activity
5.0
 
I Use This

DisPass

Compare

  Analyzed about 4 hours ago

DisPass is a password manager for GNU/Linux, *BSD, MacOS X and Windows. It can be used as any traditional password manager, but has one key difference. DisPass does not store your passwords anywhere, so you can never lose them. It creates strong and unique passphrases formed from a master password ... [More] and a label (and some optional parameters), helping you get rid of the bad habit of using a single password for multiple websites. Dispass is a console application, but also has a simple graphical interface. [Less]

1.73K lines of code

1 current contributors

over 5 years since last commit

2 users on Open Hub

Inactive
5.0
 
I Use This

Enchanted Keyfinder

Compare

  Analyzed 1 day ago

is a Magical Jelly Bean Keyfinder fork. It is a utility that retrieves the product key used to install Windows from your registry or from an unbootable Windows installation. It works on Windows 9X, ME, NT/2K/XP, and Vista/Win7 and for other software.

4.88K lines of code

0 current contributors

almost 12 years since last commit

1 users on Open Hub

Inactive
0.0
 
I Use This
Licenses: No declared licenses

Tomb, the Crypto Undertaker

Compare

Claimed by Dyne.org Analyzed 1 day ago

Tomb is a system to make strong encryption easy for everyday use. A tomb is like a locked folder that can be safely transported and hidden in a filesystem. Its keys can be kept separate; for example, you can keep the tomb on your computer and its key on a USB stick or a remote SSH shell. Tomb is ... [More] written in code that is easy to review and links shared components: it consists of a ZShell script and desktop integration apps; it uses standard GNU tools and the cryptographic API of the Linux kernel (dm-crypt) via cryptsetup. [Less]

7.73K lines of code

6 current contributors

3 months since last commit

1 users on Open Hub

Low Activity
0.0
 
I Use This

pgpry

Compare

  Analyzed 1 day ago

pgpry is a Pthread-based password recovery program for private OpenPGP keys. Numerous options for restricting the key space are offered, including regular expression filtering and prefix/suffix filters.

5.04K lines of code

0 current contributors

almost 8 years since last commit

0 users on Open Hub

Inactive
0.0
 
I Use This

LifeWeb Core

Compare

  Analyzed 1 day ago

Core libraries for LifeWeb

0 lines of code

0 current contributors

about 3 years since last commit

0 users on Open Hub

Activity Not Available
0.0
 
I Use This
Mostly written in language not available
Licenses: No declared licenses

NeuroCrypto

Compare

  Analyzed about 17 hours ago

This is a C++ implementation of the concept of Neural Cryptography, which is a communication of two tree parity machines for agreement on a common key over a public channel. This exchanged public key is utilized to encrypt a sensitive message to be transmitted over an insecure channel using Rijndael ... [More] cipher. This is a new potential source for public key cryptography schemes which are not based on number theoretic functions, and have small time and memory complexities. This is a proof-of-concept demo of how such a neural key exchange protocol in conjugation with AES encryption can be implemented in C++, which could be further extended in higher-level applications. Both CLI and GUI implementations of the software were created using Visual C++ (.NET framework). [Less]

1.27K lines of code

0 current contributors

about 13 years since last commit

0 users on Open Hub

Inactive
0.0
 
I Use This

Highlight Navigation

Compare

  Analyzed 1 day ago

Highlight Navigation enables item highlighting & navigation for elements via mouse, keyboard, & touchscreen. Ever wanted to move down table rows via the up or down arrow keys? Did you ever also want to perform some action, such as opening a new window when the enter key was pressed on an ... [More] item? Don't forget highlighting as you move around! Did you want all of this functionality for other elements too, such as menus? Remember, all functionality is available for mouse & touch controls, too. Don't want to navigate with arrows? Easily configure keys. Built to work for all elements with children, without needing extra code. Elements tested & confirmed working are: TABLE, UL, OL, NAV, and DL. For ease of configuration & control, all methods are exposed & there are callbacks for all events. [Less]

195 lines of code

0 current contributors

over 10 years since last commit

0 users on Open Hub

Inactive
0.0
 
I Use This