[go: up one dir, main page]

Search Results for "cisco configuration backup tools"

Showing 2 open source projects for "cisco configuration backup tools"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Simple, Secure Domain Registration Icon
    Simple, Secure Domain Registration

    Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.

    Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
    Sign up for free
  • 1
    apache/solr-operator

    apache/solr-operator

    Official Kubernetes operator for Apache Solr

    Solr Operator is a Kubernetes operator for managing Apache Solr clusters in a cloud-native environment. It automates deployment, scaling, and maintenance of Solr instances within Kubernetes, making it easier to manage search infrastructures at scale. It supports rolling updates, backups, and configuration management for Solr.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    age

    age

    A simple, modern and secure encryption tool (and Go library)

    ... for personal data encryption, backup use-cases, scripting encryption workflows, and embedding encryption in tools. Because of its design philosophy, it avoids the bloat of many older encryption utilities while maintaining strong cryptographic hygiene. It’s especially useful for developers or system administrators who want to adopt encryption without learning a multitude of options.
    Downloads: 3 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next