Showing 4 open source projects for "x probe"

View related business solutions
  • MongoDB Atlas runs apps anywhere Icon
    MongoDB Atlas runs apps anywhere

    Deploy in 115+ regions with the modern database for every enterprise.

    MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    GXSM

    GXSM

    Scanning Probe Microscopy Controller and Data Visualization Software

    GXSM -- Gnome X Scanning Microscopy: A multi-channel image and vector-probe data acquisition and visualization system designed for SPM techniques (STM,AFM..), but also SPA-LEED/LEED/LEEM data analysis. A plug-in interface allows any user add-on data-processing and special hardware and instrument support. Latest: NC-AFM and related explorative methods as SQDM can be configured. High-Speed external PAC-PLL hardware option with digital DSP link. Based on several hardware options it supports...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    C-GM Counter

    C-GM Counter

    Connected GM Counter device (IoT) for radioactivity measure

    The C-GM Counter is a low cost (<50$) DIY Hardware & Firmware for building a Connected Geiger-Müller counter device to record beta-gamma radiation levels. The counter is the hardware part of the overall A-GM project aimed for providing a long-term continuous measurement of the radioactivity level. see also A-GM Manager at https://www.instructables.com/id/DIY-Radioactivity-Counter-IoT-and-Eco-system/ ** IMPORTANT ** : From v1.4, Arduino Nano require Optiboot bootloader to work, other...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    howmanypeoplearearound

    howmanypeoplearearound

    Count the number of people around you by monitoring wifi signals

    howmanypeoplearearound calculates the number of people in the vicinity using the approximate number of smartphones as a proxy (since ~70% of people have smartphones nowadays). A cellphone is determined to be in proximity to the computer based on sniffing WiFi probe requests. Possible uses of howmanypeoplearearound include, monitoring foot traffic in your house with Raspberry Pis, seeing if your roommates are home, etc. There are a number of possible USB WiFi adapters that support monitor mode...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Tkined/Scotty

    Tkined/Scotty

    Tkined/Scotty is a graphical network monitoring package

    ... the Domain Name System (DNS) * access UDP sockets * probe and use some selected SUN RPCs * send and receive SNMP messages (SNMPv1, SNMPv2C, SNMPv3) * write special purpose SNMP agents in Tcl * parse and access SNMP MIB definitions * schedule jobs that are to be done regularly * realize event driven programming on network maps
    Downloads: 1 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Previous
  • You're on page 1
  • Next