Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.
Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
Learn More
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
A FDTD solver for electromagnetic wave simulations on a GPU cluster
KEMP is a fast FDTD solver on a GPU-based cluster. The FDTD (Finite-Difference Time-Domain) method is a popular numerical method for electromagnetic field simulations. KEMP enables hardware accelerations suitable for multi-GPU, multi-core CPU and GPU cluster. KEMP also provide easy configuration by using Python scripting language.
A language and a compiler for the solution of differential equations (ODE). Both lumped and distributed variables (PDE) will be possible. The ability to solve DAEs is a long term goal. The compiler generates a Python program that does the computation.
General purpose discrete event simulation (DES) framework for the Pythonprogramminglanguage. Khronos gathers ideas from other simulation software and tries to provide a simple and poweful toolset for simulation of discrete systems.
No-Nonsense Code-to-Cloud Security for Devs | Aikido
Connect your GitHub, GitLab, Bitbucket, or Azure DevOps account to start scanning your repos for free.
Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.