. From Fortune 500 to small businesses with remote workers, every industry can gain from premium endpoint security.
DriveStrike protects devices and data in the event of loss, theft, or use in remote locations. Remotely locate, lock, and wipe devices you manage to prevent data compromise. DriveStrike prevents data breaches to ensure confidentiality, compliance, and a competitive edge.
Learn More
Fax.Cloud delivers encrypted, point-to-point faxing with guaranteed delivery and built-in audit trails
For organizations in regulated industries needing a solution to replace traditional fax infrastructure and integrate with email or online portals
Unlike email or file-sharing tools, Fax.Cloud doesn’t bounce around the internet, exposed and vulnerable. It’s direct, encrypted, and verified. You get delivery confirmation, audit trails, and peace of mind, without the spam filters, metadata leaks, or cyber threats.
reticulate is an R package from Posit that creates seamless interoperability between R and Python. It lets you call Python modules, classes, and functions from within R, automatically translating between R and Python data structures. Useful for combining Python tooling with R projects, data analysis, and RMarkdown reports.
hewies user interface - 3D scientific visualisation tool
Python project with goal to provide FOSS library to extract, analyse and visualise data in a 3D fashion.
The instance will connect to a data source, ods sheet, csv, sql DB, pyodbc
the instance will analyse and/or transform the data to be presented to the visualisation functionality
the instance will visualise the data in a 3D fashion, likely using third party FOSS
JDisc Discovery supports the IT organizationss of medium-sized businesses and large-scale enterprises.
JDisc Discovery is a comprehensive network inventory and IT asset management solution designed to help organizations gain clear, up-to-date visibility into their IT environment. It automatically scans and maps devices across the network, including servers, workstations, virtual machines, and network hardware, to create a detailed inventory of all connected assets. This includes critical information such as hardware configurations, software installations, patch levels, and relationshipots between devices.