Skip to main content

Home/ Online Tools/ Group items matching "data" in title, tags, annotations or url

Group items matching
in title, tags, annotations or url

Sort By: Relevance | Date Filter: All | Bookmarks | Topics Simple Middle
Janos Haits

VMware backup | Hyper-V backup | Data center backup - 2 views

  •  
    "Vembu BDR Suite for Virtual and Physical Data Centers"
Janos Haits

Data Selfie _ Home - 6 views

  •  
    "We want to give you back your Facebook data. data Selfie is a browser extension that tracks you while you are on Facebook to show you your own data traces and reveal how machine learning algorithms use your data to gain insights about your personality."
Janos Haits

Vulnerability, CDR and Antivirus APIs | Metadefender - 2 views

  •  
    "Select or drop a file up to 140 MB in size for malware analysis, vulnerability check, and data sanitization (CDR; Content Disarm and Reconstruction)."
Janos Haits

IT Security Database. OVAL patch, vulnerability, compliance definitions Data source - 1 views

  •  
    "This site collects OVAL(Open Vulnerability and Assessment Language) definitions from several sources like Mitre, Red Hat, Suse, NVD, Apache etc and provides a unified, easy to use web interface to all IT security related items including patches, vulnerabilities and compliance checklists."
Janos Haits

World and regional statistics, national data, maps, rankings - 6 views

  •  
    World Data Atlas. World and regional statistics, national Data, maps, rankings. 370M+timeseries: 960+topics: 900+sources: Take a look at Data coverage matrix by country or topic to see the full picture!
Janos Haits

Named Data Networking (NDN) - A Future Internet Architecture - 1 views

  •  
    'The Named Data Networking (NDN) project aims to develop a new Internet architecture that can capitalize on strengths - and address weaknesses - of the Internet's current host-based, point-to-point communication architecture in order to naturally accommodate emerging patterns of communication. By naming Data instead of their locations, NDN transforms Data into a first-class entity. The current Internet secures the Data container. NDN secures the contents, a design choice that decouples trust in Data from trust in hosts, enabling several radically scalable communication mechanisms such as automatic caching to optimize bandwidth.'
Janos Haits

Illumio Homepage - 3 views

  •  
    "Illumio delivers adaptive security that works across the largest data centers and cloud computing environments. Our customers gain live visibility, adaptive micro-segmentation, and instant encryption without dependencies on the network or hypervisor, and thus can run on all workloads across all environments."
Janos Haits

NewCloudAtlas.org - 8 views

  •  
    'The New Cloud Atlas is a global effort to map each data place that makes up the cloud in an open and accountable way. We have set out to find and map each warehouse data centre, each internet exchange, each connecting cable and switch. Anything of any physical significance in the operation of the cloud should be observed is some way, and recorded for everyone to see and use.'
Janos Haits

Free data, statistics, analysis, visualization & sharing - knoema.com - 6 views

  •  
    "Smarter Research With All Statistics In Your Hands"
Janos Haits

The No More Ransom Project - 3 views

  •  
    "Ransomware is malware that locks your computer and mobile devices or encrypts your electronic files. When this happens, you can't get to the data unless you pay a ransom. However this is not guaranteed and you should never pay!"
Janos Haits

nextcloud.com - 6 views

  •  
    "A safe home for all your data. Access & share your files, calendars, contacts, mail & more from any device, on your terms"
Janos Haits

Secure Cloud Storage, Collaboration, Backup and Drive Sync - XXL Box! - 8 views

  •  
    "SAY HELLO TO XXL BOX CLOUD STORAGE Your files - pictures - documents, anywhere! XXL Box breathes new life into secure Cloud Data Storage, Document Sharing, Collaboration and Backup"
Janos Haits

Identity Leak Checker - 12 views

  •  
    With the HPI Identity Leak Checker, it is possible to check whether your e-mail address, along with other personal data (e.g. telephone number, date of birth or address), has been made public on the Internet where it can be misused for malicious purposes.
Janos Haits

Home | Internet Monitor Dashboard - 14 views

  •  
    "Internet Monitor lets you explore, create, customize, and share dashboards of data visualizations about multiple facets of the Internet."
Janos Haits

Freepto 1.0 - 9 views

  •  
    Freepto is a Linux-based operating system on USB stick. This means you can bring it with you and use any computer as it was your own. Also, data you save on the USB stick will always automatically be encrypted (i.e. nobody else will be able to access them).
  •  
    Actually sounds pretty neet...
Janos Haits

BrowserLeaks.com - Web Browser Security Checklist for Identity Theft Protection - 2 views

  •  
    "BrowserLeaks.com - It's all about Web Browser Fingerprinting. Here you will find the gallery of web browser security testing tools, that tell you what exactly personal identity data may be leaked without any permissions when you surf the Internet."
stuza1 .

Google Maps - 1 views

    • stuza1 .
       
      Marion Isalnd South african Meteorolical station
  •  
    Marion Isalnd South african Meteorolical station
basefolder

Cloud Storage Security And Privacy Concerns - 1 views

  •  
    The popularity of Cloud storage is increasing at a steady rate as we see more and more users moving data to the cloud. As per a recent survey, it was found that one out of five internet users have used Cloud to store data.
‹ Previous 21 - 40 of 220 Next › Last »
Showing 20 items per page