The Pegasus Workflow Management System encompasses a set of technologies which help workflow-based applications execute in a number of different environments, including desktops, campus clusters, grids, and clouds. It bridges the scientific domain and the execution environment by automatically mapping high-level workflow descriptions onto distributed resources. It automatically locates the necessary input data and computational resources necessary for workflow execution. It enables scientists to construct workflows in abstract terms without worrying about the details of the underlying execution environment or the particulars of the low-level specifications required by the middleware (Condor, Globus, or Amazon EC2). It bridges the current cyberinfrastructure by effectively coordinating multiple distributed resources.
"TCP Input Text" extracts TCP ports and fully qualified domain names (FQDN) from search results into a .csv file and individual shell scripts for nmap and nc (a.k.a. netcat) to provide assurance of a listening TCP service since the time that has passed of the last crawl performed by the search engine.
The Android Scripting Environment (ASE) brings scripting languages to Android by allowing you to edit and execute scripts and interactive interpreters directly on the Android device. These scripts have access to many of the APIs available to full-fledged Android applications, but with a greatly simplified interface that makes it easy to handle intents, start activities, make phone calls, send text messages, scan bar codes, poll location and sensor data, use text-to-speech, and more. Scripts can be run interactively in a terminal, started as a long running service, or started via Locale. Python, Perl, JRuby, Lua, BeanShell, and Bourne shell are currently supported.
FuzzyOcr is a plugin for SpamAssassin that can be used on image spam. It supports optical character recognition using different engines and settings, a fuzzy word matching algorithm applied to OCR results, an image hashing system to learn the unique properties of known spam images, dimension, size, and integrity checking of images, and content-type verification for the containing email message.