Results for: protocol - Page 9

Suggested Categories:

Layer 2 Protocols
Layer 2 protocols are blockchain protocols that are built on top of an existing blockchain network. A layer 2 protocol is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications can be built on Layer 2 protocols, and layer 2 protocols interact with layer 1 protocols in order to improve efficiency and overall user experience.
Layer 1 Protocols
Layer 1 protocols, also known as layer 1 blockchains, are blockchain protocols that are built as the base layer of a blockchain. A layer 1 protocol serves as the underlying base blockchain of a blockchain network, as opposed to a layer 2 protocol which is designed to improve the scaling problems and transaction speeds and fees that layer 1 blockchain networks and protocols face. Decentralized applications and cryptocurrencies can be built on Layer 1 protocols, and layer 1 protocols interact with layer 2 protocols in order to improve efficiency and overall user experience.
File Transfer Protocol (FTP) Software
File transfer protocol (FTP) software is software used for transferring files between different devices over a network. It allows users to upload and download files securely and efficiently. The software uses a client-server architecture, meaning one device acts as the client initiating the file transfer while the other device acts as the server receiving the data. FTP software also allows for remote access to files stored on a server, making it convenient for businesses and individuals with large amounts of data. Additionally, it supports multiple file formats and can resume interrupted transfers.
NFT Liquidity Protocols Software
NFT liquidity protocols are decentralized financial (DeFi) platforms that aim to increase the liquidity of non-fungible tokens (NFTs) by facilitating their buying, selling, and trading in a more efficient and seamless manner. These protocols typically enable NFT owners to access liquidity by offering services such as fractionalization, NFT-backed loans, or secondary markets for NFT assets. The goal of these protocols is to make NFTs more accessible and tradable by lowering the barriers to entry and providing more opportunities for investors, creators, and collectors.
DeFi Projects
DeFi projects are DeFi (decentralized finance) platforms built on the blockchain that are being actively developed. DeFi projects and DeFi platforms can serve a multitude of purposes, with the aim of making it easy for cryptocurrency investors and DeFi traders to trade, stake, earn, lend, and borrow using DeFi apps on the blockchain.
IT Management Software
IT management software is software used to help organizations and IT teams improve operational efficiency. It can be used for tasks such as tracking assets, monitoring networks and equipment, managing workflows, and resolving technical issues. It helps streamline processes to ensure businesses are running smoothly. IT management software can also provide accurate reporting and analytics that enable better decision-making.
Cross Chain Bridges
Cross-chain bridges are platforms or protocols that enable the transfer of assets and data between different blockchain networks, facilitating interoperability across otherwise isolated blockchains. These bridges allow users to move tokens, cryptocurrencies, or other digital assets seamlessly between two distinct blockchains without relying on a central intermediary. By unlocking cross-chain capabilities, users can leverage the unique features of each blockchain, such as different consensus mechanisms or specialized use cases, while maintaining the security and decentralization of both networks. Cross-chain bridges often use wrapped tokens or smart contracts to facilitate the exchange of assets across chains, improving liquidity and expanding the potential for decentralized applications (dApps). This technology is crucial for advancing the adoption and scalability of decentralized finance (DeFi) and other blockchain-based applications.
IoT Device Management Software
IoT device management software helps businesses monitor, control, and maintain Internet of Things (IoT) devices within a network. These tools enable organizations to efficiently manage a wide array of IoT devices, from smart sensors and wearables to industrial machines, by providing features such as device provisioning, configuration, monitoring, diagnostics, and firmware updates. IoT device management software helps ensure the security, performance, and reliability of connected devices by tracking device health, detecting anomalies, and enforcing compliance with security policies. It is essential for businesses that rely on large numbers of IoT devices, particularly in industries such as manufacturing, healthcare, transportation, and smart cities.

392 Products for "protocol" with 1 filter applied:

  • 1
    LynkEDI

    LynkEDI

    Lynk Technologies

    How We Help You? EDI Integration. Easy Integration with any ERP system. Any to Any Mapping. Easy Trading Partner Management Ecommerce EDI Integration. Support for all EDI Standards. Cloud and Web EDI Solution. Cloud based Technology. Easy Access from anywhere Simple, Flexible and Dependable. Reliable EDI Transmission. Support for all Communication protocols. Fast, Secure and Reliable. Scalable and Configurable. Configurable to meet your needs. Scalable to add new features. On demand...
  • 2
    CORE (Clinical On-demand Research)

    CORE (Clinical On-demand Research)

    CIRU, University of Southampton

    ...Vision, which the Unit first engaged with under a FP7 EU funding framework, and has successfully deployed the ALEA eCRF (electronic Case Report Form) to support trials within the UK and New Zealand. The CORE team offer a range of services which include: Database build. (CRFs, randomisations, drug supply management and ePRO (ALEA)). Data hosting (ALEA hosting for data/videos/images/documents). Expert advice (including funding application, statistics support and writing a protocol advice).
  • 3
    GoDMARC

    GoDMARC

    Neuailes Global Technologies

    Actively block phishing Boost Email Deliverability Get Visibility - DMARC. To secure your inbox and boost email deliverability check your domain status below. What is DMARC? DMARC is an email authentication protocol designed to offer email domain owners the ability to safeguard their dedicated domain from unauthorized usage. DMARC at a Glance Professional DMARC Services. The most commonly used technical term DMARC is the abbreviation for Domain-based Message Authentication Reporting...
    Starting Price: $144
  • 4
    EcoStruxure

    EcoStruxure

    Schneider Electric

    ... standard open protocols out-of- the-box. Future ready buildings ensure new technology expansions deploy easily all while: maximizing building efficiency, optimizing comfort & productivity, and increasing building value. EcoStruxure Building is the open innovation platform of buildings – a collaborative IoT solution that is scalable, secure and global to create smart and future-ready buildings. It ensures customers’ smart buildings are even more connected, hyper-efficient, truly sustainable
  • 5
    Dotter.science

    Dotter.science

    KerNel Biomedical

    Welcome to Dotter.science, the online platform to support clinical research. Intended for researchers and organizations piloting health research protocols, Dotter allows you to be supported in carrying out your study and to stay focused on the essentials. Collect and analyze your clinical research data with ease. On Dotter.science, easily create collection forms and optimize the entry of your clinical research databases, in order to facilitate statistical analysis and publication. Aimed...
  • 6
    RainLoop

    RainLoop

    RainLoop

    Modest system requirements, decent performance, simple installation and upgrade, no database required - all these make RainLoop Webmail a perfect choice for your email solution. Modern user interface. Complete support of IMAP and SMTP protocols including SSL and STARTTLS. Sieve scripts (Filters and vacation message). Minimalistic resources requirements. Direct access to mail server is used (mails are not stored locally on web server). Allows for adding multiple accounts to primary one...
    Starting Price: $95 per year
  • 7
    OVH Load Balancer
    ... are now included in all of our Load Balancer solutions – completely free – and will activate HTTPS protocol by default. The Anycast DNS system means that the server nearest to your user’s location will load your website, improving load times. Use metrics to monitor your Load Balancer's load and outgoing requests to your servers. This information can then be used to maximise your system’s performance!
    Starting Price: $22.99 per month
  • 8
    IBM Sterling File Gateway
    IBM® Sterling File Gateway enables companies to consolidate all internet-based file transfers on a single, scalable, secure and always-on edge gateway. The offering has the capabilities necessary to intelligently monitor, administer, route and transform high volumes of inbound and outbound files. Companies deploying File Gateway are empowered to lower the costs of managing file transfers, accelerate time to revenue and improve trading partner satisfaction. IBM Sterling File Gateway also...
  • 9
    IBM Sterling Connect:Direct
    IBM® Sterling Connect:Direct provides security-hardened, point-to-point file transfers to lessen dependency on unreliable File Transfer Protocol (FTP) transfers. It is optimized for high-volume delivery of files within and among enterprises. The solution ensures more reliable movement of files, from batch integration and movement of large images or catalogs to synchronization with remote locations. Sterling Connect:Direct also supports hybrid cloud deployment through certified containers which...
  • 10
    Forcepoint Trusted Gateway System
    Forcepoint Trusted Gateway System Secure data transfers for your mission-critical files, every time. Reliably transfer unstructured files transfer. PDF and Microsoft Office files between and within different classification levels for international, federal, state, and local entities. Comply with Raise the Bar initiatives Achieve breach-resilient, mission-safe architectural design that meets the U.S. Government’s Raise the Bar requirements. Streamline file transfer processes and eliminate air...
  • 11
    AWS Certificate Manager
    ..., and renewing SSL/TLS certificates. SSL, and its successor TLS, are industry standard protocols for encrypting network communications and establishing the identity of websites over the Internet. SSL/TLS provides encryption for sensitive data in transit and authentication using SSL/TLS certificates to establish the identity of your site and secure connections between browsers and applications and your site.
  • 12
    Biscom Secure File Transfer
    Digital Transformation by Biscom. Solving the real-world complexity of fax and secure document delivery for the most highly regulated industries. Biscom is trusted by the world’s largest healthcare, financial, and government enterprises. Our solutions. Fax On-Prem. Hybrid. Cloud. Secure, Reliable, Scalable Fax Software and Fax Servers. Mission Critical Workflows. HIPAA, FERPA, SOX. Secure File Transfer (On-Prem. Cloud). Secure Email and Document Delivery. Secure Large File Transfer....
    Starting Price: $120 per user, per month
  • 13
    GoGetSSL

    GoGetSSL

    GoGetSSL

    ..., wildcard SSL certificates and of course multiple domains certificates available. Every certificate comes with the green lock in the address bar and website ranking improvement in Google Search engine. With EV certificates you get even more instant trust via green address bar with your verified company name. SSL protocol is one the most powerful way to protect your traffic against hackers and criminals. Remember, losing sensitive data of your customers means their losing trust!
    Starting Price: $4.43
  • 14
    Kamzan

    Kamzan

    Kamzan

    .... The encrypted communication protocol uses a unique TLS 1.3 certificate for each customer. A uniquely European supply chain and a contract in which we make it clear that profiling will never be carried out, that no data will ever be sold or transferred to third parties and that the intellectual and physical property of the data in their entirety is held by the client company.
  • 15
    Chronosphere

    Chronosphere

    Chronosphere

    ...D ingestion protocols. Storage and index for both Prometheus and Graphite data types in the same solution. Embedded Grafana compatible dashboards with full support for PromQL and Graphite. Dependable alerting engine with integration for PagerDuty, Slack, OpsGenie and webhooks. Ingest and query billions of metric data points per second. Trigger alerts, pull up dashboards and detect issues within a second. Keep three consistent copies of your data across failure domains.
  • 16
    Google Cloud Memorystore
    ... for Redis instances are replicated across two zones and provide a 99.9% availability SLA. Instances are monitored constantly and with automatic failover—applications experience minimal disruption. Choose from the two most popular open source caching engines to build your applications. Memorystore supports both Redis and Memcached and is fully protocol compatible. Choose the right engine that fits your cost and availability requirements.
  • 17
    AsparaDB

    AsparaDB

    Alibaba

    ApsaraDB for Redis is an automated and scalable tool for developers to manage data storage shared across multiple processes, applications or servers. As a Redis protocol compatible tool, ApsaraDB for Redis offers exceptional read-write capabilities and ensures data persistence by using memory and hard disk storage. ApsaraDB for Redis provides data read-write capabilities at high speed by retrieving data from in-memory caches and ensures data persistence by using both memory and hard disk...
  • 18
    Teradici

    Teradici

    Teradici

    Rediscover how Teradici is making remote work, work everywhere and anywhere. Top government agencies, media conglomerates, production studios, financial firms, and design houses trust Teradici to support their need for secure, high-performance virtual desktops and workstations. With 15+ years of experience, you can trust us too. Whether you are migrating to the cloud, managing zero clients or building something new, we can help. The protocol transfers only image information in the form...
  • 19
    MidoNet

    MidoNet

    MidoNet

    ...-grade distributed overlay networking to OpenStack. Features such as reduced complexity of physical network, high availability (any server, any network service, any time), scalability through hierarchy, reduced protocols, otimized network traffic with minimal overhead, vastly improved fault tolerance.
  • 20
    Google Cloud IoT Core
    ... that integrates seamlessly with Google Cloud data analytics services. Use your IoT data stream for advanced analytics, visualizations, machine learning, and more to help improve operational efficiency, anticipate problems, and build rich models that better describe and optimize your business. Securely connect a few or millions of your globally dispersed devices through protocol endpoints that use automatic load balancing and horizontal scaling to ensure smooth data ingestion under any condition.
    Starting Price: $0.00045 per MB
  • 21
    KeyScaler

    KeyScaler

    Device Authority

    ... provisioned, this process rapidly becomes unmanageable without automation. The IoT demands an approach to identification that starts with individual devices – authenticated automatically and dynamically, with no manual intervention required. Device Authority has developed a flexible device interface protocol that interoperates with KeyScaler® for delivering automated PKI for IoT devices - providing two alternatives for device authentication.
  • 22
    StrongLink

    StrongLink

    StrongBox

    ..., and acts as a seamless extension to tape for existing flash/disk storage platforms, opening it into a multi-protocol policy-based Global Namespace. The new StrongLink LTFS feature takes tape to the next level, with metadata-driven intelligence that enables policy-based workflows that integrate directly into the rest of your storage infrastructure. Perfect for growing environments, StrongLink with LTFS support can expand as needed to extreme scales, while providing simplicity and automation.
  • 23
    WorkOS

    WorkOS

    WorkOS

    ...-proven solution for your customers. Free your support team from the ongoing headache of configuring SSO for enterprise customers. The Admin Portal is a hosted interface for IT admins to directly set up WorkOS. WorkOS provides a single, elegant interface that abstracts dozens of enterprise integrations. This means you're up-and-running 10x faster and can focus on building unique features for users instead of debugging legacy protocols and fragmented IT systems.
    Starting Price: $49 per user per month
  • 24
    Raysync

    Raysync

    Raysync

    ..., transfer distance, and network conditions. The transfer protocol independently developed by Raysync can make full use of network bandwidth resources and increase the transfer speed by 100 times, enabling the safe and fast transfer of files to any place.
    Starting Price: $699/year
  • 25
    Intel Server Management
    ...-users to monitor and manage servers either through management software they build on their own, existing solutions such as Intel® Data Center Manager and Intel® Server Utilities, or by third-party tools. Extensive Redfish schemas available to manage, update firmware and view asset inventory. Legacy protocols like IPMI, SNMP, SMTP are fully supported on the platform. IPMI is 2.0 compliant with several additional OEM commands included, as well.
  • 26
    Azure NetApp Files
    ..., and enterprise web-applications. Support for multiple protocols enables “lift & shift” of both Linux & Windows applications to run seamlessly in Azure. Multiple performance tiers allow for close alignment with workload performance requirements. Deep integration into Azure enables a seamless & secure Azure experience, with no learning or management overhead. Leading certifications including SAP HANA, GDPR, and HIPAA enables migration of the most demanding workloads to Azure.
    Starting Price: $0.14746
  • 27
    Dogtag

    Dogtag

    Dogtag

    ... issuance, revocation, and retrieval. Certificate Revocation List (CRL) generation and publishing. Certificate Profiles. Simple Certificate Enrollment Protocol (SCEP). Local Registration Authority (LRA) for organizational authentication and policies. Encryption key archival and recovery. Smartcard lifecycle management. Token profiles, token enrollment, on-hold, key recovery, and format. Face-to-face enrollment with the security officer workstation interface.
  • 28
    Apache Avro

    Apache Avro

    Apache Software Foundation

    Apache Avro™ is a data serialization system. Avro provides rich data structures, a compact, fast, binary data format, a container file, to store persistent data, remote procedure call (RPC). Also, it provides simple integration with dynamic languages. Code generation is not required to read or write data files nor to use or implement RPC protocols. Code generation as an optional optimization, only worth implementing for statically typed languages. Avro relies on schemas. When Avro data is read...
  • 29
    myDevices

    myDevices

    myDevices

    Maintains encrypted connections with devices supporting HTTP and MQTT protocols. Receives traffic from LoRa Network Servers and data stream from other IoT Clouds. All-purpose serverless computing or function as a service (FaaS) provides codecs and integrations online editing. Decodes and normalizes uplink device data and encodes downlink commands simplifying the deployment of integration functions. Manage device registry, configuration, provisioning, and FOTA scheduling and batching. Easily de...
  • 30
    Deepnet DualShield

    Deepnet DualShield

    Deepnet Security

    If you are looking for an enterprise grade 2-factor authentication (2FA) or multi-factor authentication (MFA) product that can secure all commonly used business applications and also provides a wide range of authentication methods, then you are in the right place. Deepnet DualShield is a multi-factor authentication system that unifies a variety of authentication methods, protocols, solutions and user experience in a single platform. In addition to the MFA functions, DualShield also provides...