Narrow your search
Remote viewing of health and system alerts generate by LogLogic MX, ST or LX SIEM appliances.Ever wanted to remotely view your LMI appliance's...
2D and 3D graphing and data visualization.
Tool to draw and print technical papers
Create and edit scientific graphs.
Create scientific plots on your Linux system.
Graph: "You give it data and it gives you a graph." Other things are straightforward, unobtrusive and automatic.FEATURES Includes several 1D, 2D...
log4me is time logger.Usefull for your "working log", and "life log".log4me features:- Easy to start and stop log. You don't need input attributes...
Track & monitor your newborn development, see growth charts, graphs and browse through the history log.Log the following activities: Feeding -...
The first Security Information and Event Management (SIEM) related App for the iPhone!Knowing the volume of logs is critical for people that have...
The Westcon Security application provides access to the Westcon Security Solutions Handbook, a valuable tool to help our customers understand...
Linux gets a lot of credit on the server, but with new appliances focused on security, monitoring, and compliance, LogLogic shows how important it is to the embedded market.
Pat Sueltz, who's served at IBM, Sun, Salesforce.com, and SurfControl, now is in charge of a start-up that can help administrators make more use of server event logs.
LogLogic's Project Lasso is an interesting open-source play, not the least because it's all about Windows.
Public-cloud providers could go a long way to making enterprise feel comfortable by providing access to log and data transaction analytics.
The Supreme Court is considering the validity of business method patents, but there's a more fundamental question for entrepreneurs: should one exercise one's patent rights?
Log files offer a wealth of information about system and user functions. They also provide a safe way to get started analyzing large data sets.
Software company hopes open-source tool will be useful to others and ultimately boost sales of its own products.
True security analysis now includes tracking network flows, directories, physical access, and video surveillance--and that has changed the security technology model.
Facebook and Google officially roll out their universal log-in systems within minutes of one another. Also, Cyber Monday results amid recession, and Nokia's newest fancy phone.
Cisco's offering for security and compliance management has languished, leaving the company with three choices: admit defeat, double down, or acquire a replacement product.