Results for: protocol - Page 6

Suggested Categories:

Layer 2 Protocols
Layer 2 protocols are blockchain protocols that are built on top of an existing blockchain network. A layer 2 protocol is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications can be built on Layer 2 protocols, and layer 2 protocols interact with layer 1 protocols in order to improve efficiency and overall user experience.
Layer 1 Protocols
Layer 1 protocols, also known as layer 1 blockchains, are blockchain protocols that are built as the base layer of a blockchain. A layer 1 protocol serves as the underlying base blockchain of a blockchain network, as opposed to a layer 2 protocol which is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications and cryptocurrencies can be built on Layer 1 protocols, and layer 1 protocols interact with layer 2 protocols in order to improve efficiency and overall user experience.
File Transfer Protocol (FTP) Software
File transfer protocol (FTP) software is software used for transferring files between different devices over a network. It allows users to upload and download files securely and efficiently. The software uses a client-server architecture, meaning one device acts as the client initiating the file transfer while the other device acts as the server receiving the data. FTP software also allows for remote access to files stored on a server, making it convenient for businesses and individuals with large amounts of data. Additionally, it supports multiple file formats and can resume interrupted transfers.
NFT Liquidity Protocols Software
NFT liquidity protocols are decentralized financial (DeFi) platforms that aim to increase the liquidity of non-fungible tokens (NFTs) by facilitating their buying, selling, and trading in a more efficient and seamless manner. These protocols typically enable NFT owners to access liquidity by offering services such as fractionalization, NFT-backed loans, or secondary markets for NFT assets. The goal of these protocols is to make NFTs more accessible and tradable by lowering the barriers to entry and providing more opportunities for investors, creators, and collectors.
DeFi Projects
DeFi projects are DeFi (decentralized finance) platforms built on the blockchain that are being actively developed. DeFi projects and DeFi platforms can serve a multitude of purposes, with the aim of making it easy for cryptocurrency investors and DeFi traders to trade, stake, earn, lend, and borrow using DeFi apps on the blockchain.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
Cross Chain Bridges
Cross-chain bridges are platforms or protocols that enable the transfer of assets and data between different blockchain networks, facilitating interoperability across otherwise isolated blockchains. These bridges allow users to move tokens, cryptocurrencies, or other digital assets seamlessly between two distinct blockchains without relying on a central intermediary. By unlocking cross-chain capabilities, users can leverage the unique features of each blockchain, such as different consensus mechanisms or specialized use cases, while maintaining the security and decentralization of both networks. Cross-chain bridges often use wrapped tokens or smart contracts to facilitate the exchange of assets across chains, improving liquidity and expanding the potential for decentralized applications (dApps). This technology is crucial for advancing the adoption and scalability of decentralized finance (DeFi) and other blockchain-based applications.
IoT Device Management Software
IoT device management software helps businesses monitor, control, and maintain Internet of Things (IoT) devices within a network. These tools enable organizations to efficiently manage a wide array of IoT devices, from smart sensors and wearables to industrial machines, by providing features such as device provisioning, configuration, monitoring, diagnostics, and firmware updates. IoT device management software helps ensure the security, performance, and reliability of connected devices by tracking device health, detecting anomalies, and enforcing compliance with security policies. It is essential for businesses that rely on large numbers of IoT devices, particularly in industries such as manufacturing, healthcare, transportation, and smart cities.

392 Products for "protocol" with 1 filter applied:

  • 1
    Amazon Elastic Container Registry (ECR)
    Easily store, share, and deploy your container software anywhere. Push container images to Amazon ECR without installing or scaling infrastructure, and pull images using any management tool. Share and download images securely over Hypertext Transfer Protocol Secure (HTTPS) with automatic encryption and access controls. Access and distribute your images faster, reduce download times, and improve availability using a scalable, durable architecture. Amazon ECR is a fully managed container registry...
  • 2
    Psiphon

    Psiphon

    Psiphon

    ... servers, and employ a variety of blocking-resilient protocols, all with the end goal of getting you access to the open internet. Our team works hard to ensure we protect our users, and to be transparent about our services. Psiphon is free to users everywhere, and as an open source platform, our software is frequently peer-reviewed and audited.
  • 3
    LDAP Administrator
    Work with several servers at once, organize them in groups, and easily copy data between them. LDAP Administrator supports LDAPv2 and LDAPv3 protocols and allows working with OpenLDAP, Netscape/iPlanet, Novell eDirectory, Oracle Internet Directory, Lotus Domino, Microsoft Active Directory, CA Directory, Siemens DirX, and any other LDAP server. Set various LDAP filters to display only the entries that match your criteria. Quickly access frequently viewed branches by setting a custom base DN...
    Starting Price: $250 one-time payment
  • 4
    AdRestore

    AdRestore

    Microsoft

    Windows Server 2003 introduces the ability to restore deleted ("tombstoned") objects. This simple command-line utility enumerates the deleted objects in a domain and gives you the option of restoring each one. Source code is based on sample code in the Microsoft Platform SDK. ADInsight is an LDAP (Light-weight Directory Access Protocol) real-time monitoring tool aimed at troubleshooting Active Directory client applications. Use its detailed tracing of Active Directory client
  • 5
    Swiftpro Auriga

    Swiftpro Auriga

    Swiftpro Corporation Limited

    ... management. Our highly optimized operational footprint allows for affordable pricing at a fraction of our competition. Consistent high-quality performance and fast remote communication that you can trust. World class security encryption protocols ensuring that your sensitive information is fully secure.
    Starting Price: $7.50 per user per month
  • 6
    MacTerm

    MacTerm

    MacTerm

    Powerful replacement for macOS Terminal, supporting 24-bit color, standard graphics protocols and iTerm2 image sequences and color schemes. MacTerm is one of the few emulators in the world that allow terminal-based programs to set up to 8 bits per RGB component (for a total of 24 bits), allowing for a large number and large spectrum of colors on the screen. The terminal is capable of preserving incoming text perfectly: whether you copy it to the Clipboard, capture it to a file, print it...
    Starting Price: Free
  • 7
    Terminals

    Terminals

    TECHNLG

    For developers and system administrators, it’s a necessity to frequently log on to Linux servers from a Windows computer. Unlike Linux OS, Windows does not have a native ssh client. Putty is the most used freeware ssh client for Windows OS. It supports telnet and ssh protocols. One constraint with Putty is that it does not have support for tabbed windows. Putty Connection manager is developed to solve this problem but it has got a lot of issues in using the utility. Terminals supports not just...
    Starting Price: Free
  • 8
    Bit SMTP

    Bit SMTP

    Bit Apps

    Many site owners face the spam mail problem for using the WordPress default PHP mail function. There may be some restrictions when it comes to mail service: sometimes emails are not delivered, sites cross the limit of outgoing mail. Bit SMTP plugin allows you to authenticate the mail service of your site by configuring the SMTP server of your desired mail service. SMTP is a protocol that helps your WordPress site make its email deliverability more easygoing & reliable. By enabling this feature...
  • 9
    Letterbox

    Letterbox

    Letterbox

    Who reads your mails? With regular mails you, the receiver, all mail providers and maybe others can read them. With end-to-end encrypted mails only the sender and the receivers can read them. Our iOS-App Letterbox makes end-to-end encryption easy to use, is compatible with most mail providers and supports the standard encryption protocol OpenPGP. Letterbox is similar to common mail apps but indicates the security state of incoming and outgoing mails. We disinguish between a confidential...
    Starting Price: Free
  • 10
    Zyber 365

    Zyber 365

    Zyber 365

    Web3 and AI-based OS, are the new innovative operating system that combines the power of cyber security and quantum proofing to create sustainable and affordable solutions for the future. We are an innovative enterprise that prioritizes the development of a sustainable cyber-chain that will form the core of our operating system with the objective of delivering a decentralized and secure working environment. Unique and immutable node for identification of each user on multiple applications....
  • 11
    Intel Quantum Simulator

    Intel Quantum Simulator

    Intel Quantum Simulator

    It is based on a complete representation of the qubit state but avoids the explicit representation of gates and other quantum operations in terms of matrices. Intel-QS uses the MPI (message-passing-interface) protocol to handle communication between the distributed resources used to store and manipulate quantum states. Intel-QS builds as a shared library which, once linked to the application program, allows to take advantage of the high-performance implementation of circuit simulations...
  • 12
    LIQUi|>

    LIQUi|>

    Microsoft

    ... protocols, quantum algorithms, quantum error correction, and quantum devices, QuArC has developed an extensive software platform called LIQUi|>. LIQUi|> allows the simulation of Hamiltonians, quantum circuits, quantum stabilizer circuits, and quantum noise models, and supports client, service, and cloud operation.
  • 13
    Cycle Labs

    Cycle Labs

    Cycle Labs

    ... risk before it costs precious time, money, and resources. With Cycle, the days of lost sleep, long hours, and back-breaking stress surrounding system deployments and peak periods are problems of the past. Build and execute tests that are able to fetch and validate data seamlessly across database connections, APIs, and vendor-specific protocols. In the Cycle platform, tests are user-focused and written in straightforward language.
  • 14
    ToDMARC

    ToDMARC

    TBS OPS LTD

    ToDMARC is an innovative email authentication SaaS platform tailored for the B2B sector, focused on helping businesses protect their domain names, brands, and email communication from threats like spoofing, impersonation, and ransomware. It brings to the table a robust suite of hosted email security protocols, including DMARC, SPF, DKIM, BIMI, MTA-STS, and TLS-RPT, integrated with streamlined reporting and AI-enhanced Threat Intelligence. This combination empowers businesses to increase...
    Starting Price: $23.99
  • 15
    Commport Value Added Network (VAN)

    Commport Value Added Network (VAN)

    Commport Communications

    Commport VAN, or Value Added Network, is a central platform facilitating electronic data interchange (EDI) between businesses. It is an intermediary, enabling secure and efficient communication by standardizing data formats and protocols. VANs add value by offering services such as data translation, mapping, and integration, streamlining the exchange process. They ensure data security, and compliance with industry standards, and provide monitoring and tracking capabilities. VAN solutions...
  • 16
    MailTester Ninja

    MailTester Ninja

    MailTester Ninja

    ... campaigns. The platform prioritizes data security with robust encryption protocols and integrates seamlessly with various email marketing platforms and CRM systems. Backed by responsive customer support and flexible pricing plans, MailTester Ninja is the go-to solution for businesses of all sizes looking to reduce bounce rates and enhance email deliverability.
    Starting Price: $3.99
  • 17
    Selendroid

    Selendroid

    Selendroid

    ... interact with multiple Android devices (emulators or hardware devices) at the same time. UI elements can be found in different locator types. Same concept for automating native or hybrid apps. No modification of the app under test is required in order to automate it. Full compatibility with the JSON Wire Protocol/Selenium 3 Ready. Existing emulators are started automatically and UI elements can be found by different locator types.
    Starting Price: Free
  • 18
    Axway B2B Integration
    Axway B2B Integration (B2Bi) is a comprehensive solution that streamlines and secures data exchanges between enterprises and their business partners. It supports a wide range of protocols and industry standards, enabling seamless integration of B2B transactions with enterprise applications like Oracle, SAP, and Infor. With features such as real-time visibility, simplified partner onboarding, and robust security measures, Axway B2Bi enhances operational efficiency and ensures compliance...
  • 19
    SonicWall NetExtender
    ..., as well as the Secure Mobile Access (SMA) 100 Series appliances. By utilizing Point-to-Point Protocol (PPP), NetExtender ensures that remote clients have reliable and secure access to internal network resources, enhancing productivity without compromising security.
    Starting Price: Free
  • 20
    AWS Transfer Family
    AWS Transfer Family is a fully managed service that enables businesses to securely transfer files to and from AWS using widely adopted protocols like FTP, SFTP, FTPS, and AS2. It helps organizations migrate and automate their file transfer workflows without the need for complex infrastructure setup. With built-in integration to Amazon S3 and other AWS services, AWS Transfer Family simplifies data management while offering scalability, security, and compliance. The service is ideal...
  • 21
    Astro VPN

    Astro VPN

    Astro VPN

    Astro VPN is a free and secure VPN service that protects your internet privacy and removes online restrictions. It uses modern encryption protocols to keep your data safe and ensure your traffic is fully encrypted. With Astro VPN, you can access content worldwide without worrying about regional blocks or bandwidth limits. The service follows a strict no-logs policy, guaranteeing that your browsing activity remains anonymous and private. Whether you’re streaming, gaming, or browsing, Astro VPN...
    Starting Price: $0
  • 22
    CData Arc

    CData Arc

    CData Arc International

    CData Arc is a leading B2B application and data connectivity solution for secure managed file transfer (MFT), EDI processing, and back-office integration. It seamlessly connects enterprise applications like CRMs, ERPs, RDBMS, and more to automate complex processes and synchronization across the enterprise, both on-premises and in the cloud. The application supports file transfer through a wide array of B2B messaging protocols including AS2, AS4, OFTP, SFTP, and more. In addition, Arc...
    Starting Price: $0.00
  • 23
    Zoho IoT
    ... integrated security, cost-effective & scope to scale. Enables registration, provisioning, authentication, monitoring & control, trouble shooting, telemetry, and firmware upgrades for IoT devices/assets at scale and follows device certificates & policies. Provides seamless connectivity to a wide variety of sensors & gateways, supports multiple protocols, and easily links with various wired/wireless communication channels.
  • 24
    X-VPN

    X-VPN

    Free Connected

    Protect your sensitive and private information. Secure your internet data with 256-bit encryption. Bank-grade multi-layered encryption technology. Choices of 9 types of security tunnels. 9 Protocols to help you bypass filters and firewalls. Access streaming & social networking apps/sites at your office, abroad. Access YouTube, Netflix, Spotify and other streaming contents. Gain access to Facebook, Twitter, Snapchat and many other apps. Mask your actual internet visit request as regular internet...
  • 25
    FileCatalyst
    Moving files is a critical process for your organization and FTP can be slow and unreliable. FileCatalyst provides fast file transfer solutions that are perfect alternatives to FTP. Our solutions enable you to send files of any size or format at full line speed, hundreds of times faster than FTP, while ensuring secure and reliable delivery.
  • 26
    Quatrix

    Quatrix

    Maytech

    Is your business at risk through uncontrolled file sharing? Is your business at risk from uncontrolled file sharing? Do you need to send and receive files securely and reliably? Our turn-key file sharing solution comes with 24/7 support, enterprise-grade security and standards compliance for protecting sensitive and private data. Read on to discover why Maytech has been chosen by organizations in over 60 industries spanning more than 35 countries. Have you ever had to send business files to...
    Starting Price: $9.00/month/user
  • 27
    Axonize

    Axonize

    Axonize

    The smarter way to realize smart business potential. A no-code smart enterprise platform that has cracked the code in profitability. Start small and scale your projects with unprecedented speed on an unlimited number of devices, protocols and systems across all verticals. Benefit from fast prototyping and virtual devices, enabling you to implement your ideas in hours, and present to customers immediately, pre-investment. Start seeing returns quickly on smaller projects and easily scale...
  • 28
    GoodSync

    GoodSync

    Siber Systems

    Easily back up and sync your files with GoodSync. Our simple and secure file backup and synchronization software will ensure that your files are never lost. Create and name your first GoodSync job, and select between one-way backup or two-way synchronization. Locate the files you like to backup or synchronize and select their destination. GoodSync supports all major protocols and cloud services. Automate your GoodSync job with real-time, periodical, or scheduled automation options. Relax...
  • 29
    Thingsboard

    Thingsboard

    Thingsboard

    It enables device connectivity via industry standard IoT protocols - MQTT, CoAP and HTTP and supports both cloud and on-premises deployments. ThingsBoard combines scalability, fault-tolerance and performance so you will never lose your data. Provision, monitor and control your IoT entities in secure way using rich server-side APIs. Define relations between your devices, assets, customers or any other entities. Collect and store telemetry data in scalable and fault-tolerant way. Visualize your...
  • 30
    S-Filer Portal

    S-Filer Portal

    OKIOK Data

    S-Filer Portal™ is a complete, on premise solution that allows large and small organizations to meet a wide range of secure file transfer, storage and sharing business requirements. It includes the functionality typically found in much more expensive Managed Secure File Transfer (MFT) and Enterprise File Sharing and Synchronization (EFSS) solutions. Unlike file sharing solutions designed for personal use, S-Filer Portal has been designed right from the start for enterprise use, resulting in...