Sales CRM and Pipeline Management Software | Pipedrive
The easy and effective CRM for closing deals
Pipedrive’s simple interface empowers salespeople to streamline workflows and unite sales tasks in one workspace. Unlock instant sales insights with Pipedrive’s visual sales pipeline and fine-tune your strategy with robust reporting features and a personalized AI Sales Assistant.
Try it for free
Build apps or websites quickly on a fully managed platform
Get two million requests free per month.
Run frontend and backend services, batch jobs, host LLMs, and queue processing workloads without the need to manage infrastructure.
The IUPAC International Chemical Identifier (InChI) is a protocol for converting a chemical structure (connection table) to a unique, predictable ASCII character string. This project will develop facilities for using and applying the InChI algorithm.
AAMS is a tool for creating simulations visually. It has a library of processing elements (PE), that you can drop on the sim designer.Connect pins between PE, in data path define the control path, and run the simulation. Supports distributed simulations
Content-Based Cross-Site Mining (CCM) of Web Data Records algorithm combines techniques of extracting data records based on the structure of documents (HTML tags) with an analysis of the semantics of the content for better data record extraction
Self study flashcards-based tool. Represents knowledge as question/answer pairs. Uses a scheduling algorithm for inter repetition invtervals optimization. Employs Web standards (XML, XSLT, HTML). Allows learning history interchange with similiar programs.
Picsart Enterprise Background Removal API for Stunning eCommerce Visuals
Instantly remove the background from your images in just one click.
With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
A desktop app to manage an osCommerce shop without access to MySQL server nor to downloading the full database, it uses a synchronizaton algorithm to send just changes.
Java Randomness Test Suite is a gui application to run randomness tests on random stream resource (file or algorithm). Application can be run in command line. Includes general statistical tests, NIST and DIEHARD tests.
A word game featuring double-letter score, triple-word score, etc. You play against the fast and furious robot. 100% Java. The project could use a look-ahead algorithm and some better choices of dictionaries.
Secure remote access solution to your private network, in the cloud or on-prem.
Deliver secure remote access with OpenVPN.
OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...
The algorithm allows any kind of weights (costs, frequencies), including non-numerical ones. The {0, 1, ..., n-1} alphabet is used to encode message. Built tree is n-ary one.The algorithm is based on a set of template classes : Cell(SYMBOL, WEIGHT), Node(
We, the people from #algos@freenode are a community of programmers discussing general/explicit algorithms to improve our knowledges - We also organise general programming contests called "Open Code Hacks", and those results (and others) are released here.
Black Box GA provides a user, with a black box program to use a genetic algorithm to help optimize problems, without the user coding a genetic algorithm, or even understanding how a Genetic Algorithm works!
BPLEX is a new algorithm for tree compression and, in particular, for constructing succinct representations of XML document structures.
The algorithm is described in "Grammar-Based Tree Compression",
Technical Report IC/2004/80, EPFL, Lausanne
IQNotes is notes kept in a hierarchical (tree like) manner. It handles todo, events, sketching. It can act as a contact, password, credit card manager and even more, because is highly configurable. Data can be encrypted by strong AES algorithm.
MedTrans is a PocketPC program that translates 1888 medical phrases into 40 different languages. This program is a port to the PocketPC from the origional program developed by the Navy. This program includes a ewe port of the FLAC compression algorithm.
VID stands for VI Distributed.
It's a distributed ncurses editor. Roughly speaking, multiple users can edit the same file at the same time. Exclusion mechanism with '1 line' as granularity. Token based algorithm for line/file/saving locking.
ALIMP (A LIttle More Privacy) is a .NET C# software enabling users to easily cypher and de-cypher files on their computer using common algorithm (DES, 3DES, AES, ...) that are shipped with the .NET Frawemork.
This folder is intended to provide a complete framework for wireless ad hoc networks implementing security and QoS specifications. The base routing algorithm to be used is choosen as DSR. A purpose specific ad hoc simulator (java) will also be developed d
TextDiff.NET is the .NET component to list differences between two integer arrays using a "longest common subsequence" algorithm. Typically, this component is used to diff 2 text files once their individuals lines have been hashed.
The "Framework for Implicit Graph Algorithms and Representations by OBDDs" (Figaro) automatically manages experiments with input generator and algorithm plugins. It already contains some generators and algorithms for graph and scheduling problems.
SHReC is a Java implementation of an hierarchical document clustering algorithm based on a
statistical co-occurence measure called subsumption, which is particularly suited to the problem of
on-line "search results" clustering.
mircCrypt is an encryption-script which enables you to communicate secured on irc-networks. By using a premade blowfish-algorithm-dll, it secures your chats by using free choosable keys. This script is just the link between the blowfish-dll and mirc.