The Open-Transactions project is a collaborative effort to develop a robust, commercial-grade, fully-featured, free-software toolkit implementing a full-strength financial cryptography library, API, CLI, and prototype server. Open-Transactions democratizes financial and monetary actions. You can use it for issuing currencies/stock, paying dividends, creating asset accounts, sending/receiving digital cash, writing/depositing cheques, cashier's cheques, creating basket currencies, trading on markets, scripting custom agreements, recurring payments, escrow, etc. Strong crypto is used. Balances are unchangeable (even by a malicious server). Receipts are destructible and redundant. The transactions are unforgeable. The cash is untraceable. The cheques are non-repudiable.
Ecasound is a software package designed for multitrack audio processing. It can be used for simple tasks like audio playback, recording, and format conversions, as well as for multitrack effect processing, mixing, recording and signal recycling. It supports a wide range of audio inputs, outputs, and effect algorithms. Effects and audio objects can be combined in various ways, and their parameters can be controlled by operator objects like oscillators and MIDI-CCs. A versatile console-mode user interface is included in the package.
GraphicsMagick is a robust collection of tools and libraries which support reading, writing, and manipulating an image in over 90 major formats including popular formats like DPX, DICOM, BMP, GIF, JPEG, JPEG-2000, PDF, PNG, PNM, SVG, and TIFF. A high-quality 2D renderer is included, which provides a subset of SVG capabilities. C, C++, Perl, Tcl, and Ruby are supported. Originally based on ImageMagick, GraphicsMagick focuses on performance, minimizing bugs, and providing stable APIs and ABIs. It runs on all modern variants of Unix, Windows, and Mac OS X.
Splunk is an engine for machine data. Use Splunk to collect, index, and harness the fast moving machine data generated by all your applications, servers, and devices: physical, virtual, and in the cloud. Search and analyze all your real-time and historical data from one place. Splunking your machine data lets you troubleshoot problems and investigate security incidents in minutes, not hours or days. Monitor your end-to-end infrastructure to avoid service degradation or outages. Meet compliance mandates at lower cost. Correlate and analyze complex events spanning multiple systems. Gain new levels of operational visibility and intelligence for IT and the business.
OSCATS (Open-Source Computerized Adaptive Testing System) implements Item Response Theory (IRT) and cognitively diagnostic (latent classification) models and item selection algorithms used in Computerized Adaptive Testing (CAT). OSCATS facilitates the development of CATs and simulations of CATs by providing ready-to-use code for running the CAT item selection and ability/classification estimation in an extensible, modular framework. The library is written in object-oriented C using GObject, and has bindings to Python, Perl, PHP, and Java.
Fast Artificial Neural Network Library is a neural network library that implements multilayer artificial neural networks in C with support for both fully connected and sparsely connected networks. Cross-platform execution in both fixed and floating point are supported. It includes a framework for easy handling of training data sets. It is easy to use, versatile, well documented, and fast. C++, Perl, PHP, .NET, Python, Delphi, Octave, Pure Data, and Mathematica bindings are available. A reference manual accompanies the library with examples and recommendations on how to use the library. A graphical user interface is also available for the library.
RedWolf is a security threat simulator that tests security system effectiveness. Its threat generation capabilities include email, IM, malware, P2P, social networking, VoIP, DDoS, and many more. The guiding philosophy is that by generating realistic scenarios in a wide variety of categories, an auditor or organization can assess the effectiveness of network defenses. The scenario suite allows one to verify compliance with PCI-DSS, Sarbanes-Oxley, or HIPAA controls. RedWolf helps identify data loss risks and provides expert recommendations concerning risk mitigation. It reports present findings, recommendations, best practices, and blocking guidance in a straightforward, easily readable format. RedWolf also acts as a 'Red Team' agent, running drills to measure the readiness of your operations staff.