Results for: protocol - Page 11

Suggested Categories:

Layer 2 Protocols
Layer 2 protocols are blockchain protocols that are built on top of an existing blockchain network. A layer 2 protocol is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications can be built on Layer 2 protocols, and layer 2 protocols interact with layer 1 protocols in order to improve efficiency and overall user experience.
Layer 1 Protocols
Layer 1 protocols, also known as layer 1 blockchains, are blockchain protocols that are built as the base layer of a blockchain. A layer 1 protocol serves as the underlying base blockchain of a blockchain network, as opposed to a layer 2 protocol which is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications and cryptocurrencies can be built on Layer 1 protocols, and layer 1 protocols interact with layer 2 protocols in order to improve efficiency and overall user experience.
File Transfer Protocol (FTP) Software
File transfer protocol (FTP) software is software used for transferring files between different devices over a network. It allows users to upload and download files securely and efficiently. The software uses a client-server architecture, meaning one device acts as the client initiating the file transfer while the other device acts as the server receiving the data. FTP software also allows for remote access to files stored on a server, making it convenient for businesses and individuals with large amounts of data. Additionally, it supports multiple file formats and can resume interrupted transfers.
NFT Liquidity Protocols Software
NFT liquidity protocols are decentralized financial (DeFi) platforms that aim to increase the liquidity of non-fungible tokens (NFTs) by facilitating their buying, selling, and trading in a more efficient and seamless manner. These protocols typically enable NFT owners to access liquidity by offering services such as fractionalization, NFT-backed loans, or secondary markets for NFT assets. The goal of these protocols is to make NFTs more accessible and tradable by lowering the barriers to entry and providing more opportunities for investors, creators, and collectors.
DeFi Projects
DeFi projects are DeFi (decentralized finance) platforms built on the blockchain that are being actively developed. DeFi projects and DeFi platforms can serve a multitude of purposes, with the aim of making it easy for cryptocurrency investors and DeFi traders to trade, stake, earn, lend, and borrow using DeFi apps on the blockchain.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
Cross Chain Bridges
Cross-chain bridges are platforms or protocols that enable the transfer of assets and data between different blockchain networks, facilitating interoperability across otherwise isolated blockchains. These bridges allow users to move tokens, cryptocurrencies, or other digital assets seamlessly between two distinct blockchains without relying on a central intermediary. By unlocking cross-chain capabilities, users can leverage the unique features of each blockchain, such as different consensus mechanisms or specialized use cases, while maintaining the security and decentralization of both networks. Cross-chain bridges often use wrapped tokens or smart contracts to facilitate the exchange of assets across chains, improving liquidity and expanding the potential for decentralized applications (dApps). This technology is crucial for advancing the adoption and scalability of decentralized finance (DeFi) and other blockchain-based applications.
IoT Device Management Software
IoT device management software helps businesses monitor, control, and maintain Internet of Things (IoT) devices within a network. These tools enable organizations to efficiently manage a wide array of IoT devices, from smart sensors and wearables to industrial machines, by providing features such as device provisioning, configuration, monitoring, diagnostics, and firmware updates. IoT device management software helps ensure the security, performance, and reliability of connected devices by tracking device health, detecting anomalies, and enforcing compliance with security policies. It is essential for businesses that rely on large numbers of IoT devices, particularly in industries such as manufacturing, healthcare, transportation, and smart cities.

392 Products for "protocol" with 1 filter applied:

  • 1
    SafePath IoT

    SafePath IoT

    Smith Micro Software

    SafePath® IoT offers the simplest way to start, scale, and manage your cellular-connected devices. As a carrier-grade, white-label solution that leverages a standard API framework and the LwM2M device management protocol, SafePath IoT enables mobile operators to curate unique connected lifestyle ecosystems for subscribers. ​Ensure safety and peace of mind for seniors with a comprehensive solution for aging independently that offers fall detection, vitals monitoring, interactive reminders...
  • 2
    Tencent Cloud Virtual Private Cloud (VPC)
    ... scaling of network resources as business scale changes and enhancing business development. You can implement resource access control at the port and instance levels through network ACLs and security groups and grant minimum account permissions through CAM to comprehensively improve your network security. Network ACL is a stateless virtual firewall that can filter selected packets and control the inbound and outbound data traffic on a subnet at the protocol and port levels.
  • 3
    Couchdrop

    Couchdrop

    Couchdrop

    Couchdrop is the modern SFTP platform for b2b file transfers, file-based automation, and data flows – simple, secure, and built for the cloud. By being completely in the cloud, Couchdrop automatically scales to meet the needs of businesses from startups to enterprises. Organizations can securely transfer millions of files and terabytes of data with automatic scaling that can meet the most intense file transfer requirements, all without having any infrastructure management. Supporting...
    Starting Price: $50/month
  • 4
    QNX Neutrino RTOS
    Since 1980, thousands of companies have deployed QNX’s real-time operating systems to ensure the ideal combination of performance, security and reliability in mission-critical systems. At the core of QNX technology is the QNX Neutrino® Real-time Operating System (RTOS), a full-featured RTOS enabling next-generation products in every industry where reliability matters, including automotive, medical devices, robotics, transportation, and industrial embedded systems. With the QNX microkernel...
  • 5
    Intego Privacy Protection
    .... Keep your data safe and private while connecting to any poorly secured network. With Intego Privacy Protection you can block ads, trackers, and malware. Intego Privacy Protection never keeps any records of users’ online activities. You can rest assured knowing you have complete privacy, and nobody knows what you’re doing online. Our app is powered by the latest and most advanced protocols like: Wireguard, PPTP, OpenVPN and L2TP/IPSec.
    Starting Price: $1.65 per month
  • 6
    ZoomEye

    ZoomEye

    ZoomEye

    ZoomEyeis the leader of global cyberspace mapping, China's first and world-renowned cyberspace search engine driven by 404 Laboratory of Knownsec, and also a world-famous cyberspace search engine. Through a large number of global surveying and mapping nodes, according to the global IPv4, IPv6 address and website domain name databases,it can continuously scan and identify multiple service port and protocols 24 hours a day, and finally map the whole or local cyberspace. Through years...
  • 7
    Spam Arrest

    Spam Arrest

    Spam Arrest

    ... mailboxes. Patented challenge, response technology blocks 100% of automated spam. Webmail allows you to access your email from any web browser, without having to install any additional software. SMTP is a standard protocol used for sending email. When you send email through the Spam Arrest SMTP server or webmail, the person you are sending email to is automatically added to your whitelist, so that they can reply to you without having to complete the verification process.
  • 8
    Getscreen.me

    Getscreen.me

    Getscreen.me

    ... safe. All transmitted data is encrypted by default with 128-bit AES algorithm inside WebRTC and SSL protocols. Integration with popular platforms like Google Chrome Extension, Telegram and Jira Service Desk, as well as with HTTP API.
    Starting Price: $5
  • 9
    IBM Cloud Messages for RabbitMQ
    IBM® Messages for RabbitMQ on IBM Cloud® supports multiple messaging protocols as a broker. It lets you route, track and queue messages with customizable persistence levels, delivery settings and publish confirmations. Get to global scale with integrated, infrastructure-as-code tools, such as IBM Cloud Schematics with Terraform and Red Hat® Ansible® support at no additional charge. IBM® Key Protect lets you can bring your own encryption key. Each deployment supports private networking, in...
  • 10
    Alibaba Cloud IoT Platform
    ... capabilities which allow for the integration of APIs and other Alibaba Cloud services. Finally, Alibaba Cloud IoT platform is highly customizable, featuring a rules engine for rapid data analysis, storage, and application development. Supports device access worldwide, from a variety of networks and providers that are all based on different protocols. Device authentication ensures the security and uniqueness of each device, and encrypted communication makes sure your data is not tampered with.
  • 11
    SnowHaze

    SnowHaze

    SnowHaze

    SnowHaze empowers you to take back control over your personal data, and we spare no effort to provide you the most secure browsing experience and internet access. SnowHaze offers a browser with your privacy and security in mind. It blocks invasive ads and trackers, protects you from browser fingerprinting, is lightning fast, and much more. SnowHaze offers a VPN service that, thanks to its novel protocol "Zero-Knowledge Auth," it does not need user accounts. Not even SnowHaze can track its...
    Starting Price: $4.58 per month
  • 12
    PandaVPN

    PandaVPN

    Wildfire Inc.

    PandaVPN is a quality and cross-platform VPN application trusted by 40 million users worldwide. By offering 0-log policy, OpenVPN protocol, 256-bit ECC Encryption, random digital accounts, bitcoin payment, built-in ad blocker, etc., PandaVPN proves itself to be secure, private, and easy to use on mainstream devices! Safeguarding the online privacy is the top concern of PandaVPN. With PandaVPN, no matter you are working with safe networks or less secure public Wifi hotspots, you are enabled...
    Starting Price: $2.77 per month
  • 13
    FileZilla Pro

    FileZilla Pro

    FileZilla

    Transfer files from your computer via FTP/SFTP/FTPS, Amazon S3, Backblaze B2, Box, Dropbox, Google Cloud, Google Drive, Microsoft Azure, Microsoft OneDrive, Microsoft OneDrive for Business, Microsoft SharePoint, OpenStack Swift and WebDAV. One tool to find, transfer and download all of your files. FileZilla Pro, the professional tool for file transfers, allows you to focus on getting your job done. Choose the platform of your choice and buy it with confidence! Need to run commands via...
    Starting Price: $19.99
  • 14
    Google Public DNS
    The Domain Name System (DNS) protocol is an important part of the web's infrastructure, serving as the Internet's phone book, every time you visit a website, your computer performs a DNS lookup. Complex pages often require multiple DNS lookups before they start loading, so your computer may be performing hundreds of lookups a day. Configure your network settings to use the IP addresses 8.8.8.8 and 8.8.4.4 as your DNS servers. If you decide to try Google Public DNS, your client programs...
    Starting Price: Free
  • 15
    Eclipse Kura

    Eclipse Kura

    Eclipse Foundation

    Eclipse Kura™ is an extensible open source IoT Edge Framework based on Java/OSGi. Kura offers API access to the hardware interfaces of IoT Gateways (serial ports, GPS, watchdog, GPIOs, I2C, etc.). It features ready-to-use field protocols (including Modbus, OPC-UA, S7), an application container, and a web-based visual data flow programming to acquire data from the field, process it at the edge, and publish it to leading IoT Cloud Platforms through MQTT connectivity. The emergence of an Internet...
    Starting Price: Free
  • 16
    ESF Edge Computing Platform
    Edge Computing enables systems to perform data processing at the edge of the network, near the source of the data. This reduces the communications bandwidth needed between sensors and the central data center by performing analytics and knowledge generation at or near the source of the data. The Internet of Things (IoT) service gateway model, running enterprise-level software stacks and operating on the edge of an IoT deployment as an aggregator and controller, provides the best foundation...
  • 17
    Duplicati

    Duplicati

    Duplicati

    Free backup software to store encrypted backups online For Windows, macOS and Linux. Duplicati works with standard protocols like FTP, SSH, and WebDAV as well as popular services like Backblaze B2, Tardigrade, Microsoft OneDrive, Amazon S3, Google Drive, box.com, Mega, hubiC, and many others. Backup files and folders with strong AES-256 encryption. Save space with incremental backups and data deduplication. Run backups on any machine through the web-based interface or via a command...
    Starting Price: Free
  • 18
    Rclone

    Rclone

    Rclone

    Rclone is a command-line program to manage files on cloud storage. It is a feature-rich alternative to cloud vendors' web storage interfaces. Over 40 cloud storage products support rclone including S3 object stores, business & consumer file storage services, as well as standard transfer protocols. Rclone has powerful cloud equivalents to the Unix commands rsync, cp, mv, mount, ls, ncdu, tree, rm, and cat. Rclone's familiar syntax includes shell pipeline support, and --dry-run protection...
    Starting Price: Free
  • 19
    Panda Security VPN
    Download Panda Security VPN for Windows or Android. For secure and private online browsing. Internet without hackers, no borders, no limitations, no danger. We have thousands of servers around the world to ensure maximum connection speed and performance. Our technology uses the most secure VPN (Virtual Private Network) protocol on the market. Panda Security lets you access all Internet content safely and privately, TV shows, social networks, sports and news channels, video/audio streaming...
    Starting Price: $36.96 per year
  • 20
    Kajeet

    Kajeet

    Kajeet

    At Kajeet, we don’t just help connect and manage IoT devices. Our solutions connect the world for good. With connectivity coverage in 173 countries and access to all major North American carrier networks, Kajeet provides anytime, anywhere access to connectivity without data ever hitting the public internet. Kajeet SecureRoute is optimized to provide a highly scalable, and secure private network. We enlist advanced security protocols at the network, application, and individual device levels...
  • 21
    XONA

    XONA

    XONA

    XONA enables frictionless user access that’s purpose-built for operational technology (OT) and other critical infrastructure systems. Technology agnostic and configured in minutes, XONA’s proprietary protocol isolation and zero-trust architecture immediately eliminates common attack vectors, while giving authorized users seamless and secure control of operational technology from any location or device. With integrated multi-factor authentication, user-to-asset access controls, user session...
  • 22
    SyberVPN

    SyberVPN

    SyberVPN

    ... 256-bit encryption to bypass government censorship, hide IP addresses, surf anonymously, and avoid dangerous public WiFi hotspots. Unlimited bandwidth and no speed limits, no throttling, and no artificial traffic shaping, unrivaled reliability. With the affordable premium VPN service, we offer you sophisticated data encryption and our proprietary, military-grade security protocol. You can now protect your identity online for as low as $1.95 per month.
    Starting Price: $1.95 per month
  • 23
    Vertiv Environet
    ... protocols to communicate with data center and facility infrastructure to obtain critical data and device statuses. These values provide alarm notifications and are stored for historic reporting. All statuses and values are displayed within a web browser with editable HTML graphics, so you can visualize the health of your data. Environet is a comprehensive software solution that allows you to run your data centers efficiently.
  • 24
    InfiConnector

    InfiConnector

    Infilock Inc.

    A middleware that is installed on a range of gateways and connects equipment to InfiIoT and popular Internet of Things(IoT) or Industrial Internet of Things (IIoT) clouds. It securely connects various devices (e.g., PV panels, battery energy storage, HVACs, EV stations, compressors, and boilers) through industrial protocols (Modbus, OPC UA, BACnet) and cellular networks (LTE and 5G). InfiConnector is configurable from cloud services to collect data from devices and sensors and prepare data...
    Starting Price: $10/month/license
  • 25
    Losant

    Losant

    Losant

    ... tracing. All of Losant’s components; from Edge Compute to End-User Experiences work together to transform data into tailored IoT solutions. Deploy logic to edge devices using Losant’s edge computing functionality. Reduce reliance on connectivity and pre-filter the data that will be sent to the cloud. Organize data and devices with Losant’s tagging and device modeling features. Provide security with TLS encryption protocols and fully revocable access keys for each device.
  • 26
    Fluux

    Fluux

    Fluux

    Your customers expect your service to work at light speed. You need to design for realtime. Realtime allows you to design new innovative services. It makes possible to create new business models. Chat, bots, live interactions, IoT, these are all new but already are taken for granted by customers. Make your developers happy by supporting the two major realtime standards. No need to make a tough choice. Be future-proof by supporting the standards. Your investment will be well spent, as you can...
    Starting Price: €200 per month
  • 27
    AbsoluteTelnet SSH Client

    AbsoluteTelnet SSH Client

    Celestial Software

    AbsoluteTelnet/SSH is a telnet and SSH client for Windows. A secure flexible SSH client with SFTP file transfer and rock-solid emulations that is suitable for developers, administrators, or deployment across the enterprise. It includes the industry standard SSH protocols to secure terminal session data across insecure environments such as the internet. Its new tabbed interface is a favorite among AbsoluteTelnet users, and new features are being added all the time! If you need unrelenting...
    Starting Price: $49.95 one-time payment
  • 28
    KiTTY

    KiTTY

    KiTTY

    ...-password, auto-reconnect, transparency, port knocking, hyperlink, print clipboard, embedded launcher, TuTTY features, RuTTY features, system tray, etc. PuTTYCrypt patch to get credentials from certificate (sshpubk.c merge fails). PuTTYCyg to run a Cygwin terminal into KiTTY. Zmodem to transfer files with ZModem protocol. Covidimus patch for the background image. New settings management evolution, ssh core is almost fully rewritten, and Windows core functions have been rewritten too.
  • 29
    mRemoteNG

    mRemoteNG

    mRemoteNG

    mRemoteNG is a fork of mRemote, an open-source, tabbed, multi-protocol, remote connections manager for Windows. mRemoteNG adds bug fixes and new features to mRemote and allows you to view all of your remote connections in a simple yet powerful tabbed interface. mRemoteNG is open-source software and is released under the terms of the GNU General Public License Version 2. The default interface is very basic in that it will show the most important part to get started with mRemoteNG. m...
    Starting Price: Free
  • 30
    SmarTTY

    SmarTTY

    SysProgs

    ... in the current directory. Clickable links in the command output. Easy-to-use GUI for APT and YUM package managers. Explore remote directory structure with Windows-style GUI. Download and upload single files with SCP protocol. Transfer entire directories with recursive SCP. Quickly send and receive directories with on-the-fly TAR. Native Windows file editing look & feel, automatic CRLF to LF conversion, and option to invoke 'sudo' to save protected files.
    Starting Price: Free