Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.
Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
Try it Free
Test your software product anywhere in the world
Get feedback from real people across 190+ countries with the devices, environments, and payment instruments you need for your perfect test.
Global App Testing is a managed pool of freelancers used by Google, Meta, Microsoft, and other world-beating software companies.
Encrypted Message Exchange by using Diffie-Hellman key exchange algorithm and Advanced Encryption Standard(AES) encryptionalgorithm with Cipher-block chaining(CBC) mode using User Datagram Protocol(UDP)port server-client application in C, Ansi-style
TaxonFinder is an application that annotates taxon found in literature. The application harnesses a hybrid algorithm that is necessarily a combination of morphological analysis, dictionary lookup and Levenstein Distance algorithm.
JHippo primarily hosted on https://edge.launchpad.net/jhippo , and is cHippo Reprogrammed in Java using the pircbot api, the same goals for cHippo are in mind with this project, a modular irc bot with built in scripting functionality.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
weka outlier is an implementation of outlier detection algorithms for WEKA.
CODB (Class Outliers: Distance-Based) Algorithm is the first algorithm developed using WEKA framework.
Maui is a multi-purpose automatic topic indexing algorithm. Given a document, Maui automatically identifies its topics. Depending on the task topics are tags, keywords, keyphrases, vocabulary terms, descriptors or Wikipedia titles.
Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.
Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights.
If you need to protect your confidential files in office or shared desktops, here is the robust command line and GUI utility to do password based encryption using AES. It can encrypt and decrypt a folder structure containing any number of files.
A small program written in java which helps you to manage your passwords in a secure way. Stores all your passwords so you only have to remember one single master password. You can create multiple profiles. 128 or 256 bit AES encryption.
This is the extended euclidean algorithm implemented in haskell.
It will put every single step of the algorithm in a file and show the actual result and everything in between.
This project is use full for student , project is developed by means of java swing ,here the cpu is stimulated by means of how it handles the multiple process at a time by means of different scheduling technique like FCFS,SJF,PSJF,RR etc.
The goal of the project is to create an example of Java ME based application for SMS message encryption. This aplication is only of academic interest and is not suitable for real safe SMS encryption.
Open KeyManager aims to provide a robust Key management server for the secure storage of private encryption keys. Open KeyManager seperates the user from encryption data using a simple API.
Backup P2P is a peer to peer application doing automated and secured backups inside a community (Jabber, XMPP). Each user shares some available space on his disk with others, to be able in return to remotely backup some of his own data.
Marc's Awesome Name Generator is a Java based library to allow the easy and fast generation of random first, middle and last names based on user-definded criteria, such as culture of origin or contained letters.
This tool encrypts text using polyalphabetic codetables, like the encryption systems in the middle ages. It can be used for simple text encryption with a small password or as a One-Time-Pad with a random codetable for 100% secure text encryption.
This library provides two operations: one to wrap key data, and another to unwrap the key data. This code also includes a fairly comprehensive unit test library which ensures the implementation is verified against the vectors provided in RFC 3394.
Rinecrypt uses the Gladman implentation of the AES algorithm
Rijndael and a SHA256 hash among other things, to encrypt/decrypt
a file with a user supplied passsword.
This is a reference implementation of snoBAC, a Bayesian Classifier designed to predict box H/ACA snoRNAs in Caenorhabditis nematode genomes. For details of algorithm and data, see Wang and Ruvinsky (2009) RNA in press.
Identification of biological species via iterational process of giving an ordered set of questions to user. The order is defined by an optimization algorithm, trying to provide the most correct prediction about the questions to ask.
Vijner 974 E-Sys (2048 bits and unlimited encryption). Enables easy (un-)encryption from text input or .txt file, and to (un-)encrypt raw files, with Vigenère Algorithm + unlimited encryption keys. Simple and powerful. Adapt to fit your needs.