Other Useful Business Software
Gain Advanced Threat Protection for Your AWS Workloads Icon
Gain Advanced Threat Protection for Your AWS Workloads

Running FortiGate NGFW on AWS Graviton2 Lets You Boost Scalability With Reduced Compute Costs

FortiGate-VM delivers comprehensive security and scalable VPN connectivity for your AWS workloads, while native AWS integrations unlock broad coverage for your environment. Now with support for AWS Graviton2 instances, FortiGate lets you optimize price performance and reduce your Amazon EC2 costs by up to 20 percent. Deploy today in AWS Marketplace.
Cyber Risk Assessment and Management Platform Icon
Cyber Risk Assessment and Management Platform

ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
Gain insights and build data-powered applications Icon
Gain insights and build data-powered applications

Your unified business intelligence platform. Self-service. Governed. Embedded.

Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
Need To Secure Your Public Cloud? Icon
Need To Secure Your Public Cloud?

Built for Developers, DevOps and Engineering Teams

View all cloud assets of AWS, Google Cloud, Azure, Kubernetes, Digital Ocean in one place. Automates security misconfigurations of assets with guidance to resolve them. Covers far beyond basic checklists. It automatically evaluates the security misconfigs of the assets & provides step-by-step guidance to resolve them
The Secure Workspace for Remote Work Icon
The Secure Workspace for Remote Work

Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.

Additional Details for Octave Forge

Intended Audience

Science/Research, Education, Developers, End Users/Desktop, Engineering

Programming Language

MATLAB, C++, C

Awards

Registered

2000-02-22

Last Updated

Categories

Scientific/Engineering, Libraries, Image Processing

Maintainers

adb014, ajanke, carandraug, cmacdonald, hauberg, i7tiol, lostbard, mattwklein, michelemartone, mtmiller, nir-krakauer, njank, oheim, siko1056, wwwandy

Keep Me Updated!