Showing 4 open source projects for "breath of life"

View related business solutions
  • Our Free Plans just got better! | Auth0 by Okta Icon
    Our Free Plans just got better! | Auth0 by Okta

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your secuirty. Auth0 now, thank yourself later.
    Try free now
  • Bright Data - All in One Platform for Proxies and Web Scraping Icon
    Bright Data - All in One Platform for Proxies and Web Scraping

    Say goodbye to blocks, restrictions, and CAPTCHAs

    Bright Data offers the highest quality proxies with automated session management, IP rotation, and advanced web unlocking technology. Enjoy reliable, fast performance with easy integration, a user-friendly dashboard, and enterprise-grade scaling. Powered by ethically-sourced residential IPs for seamless web scraping.
    Get Started
  • 1

    Secure-Browser

    Anonymous Search and Browser in One place

    A clean secure browser with a built-in search engine that is entirely anonymous. This is a beta and will get updated regularly You should check out this browser and search engine. If you are tired of selling your info to Facebook, Google, and Microsoft Breath new life into old applications that will no longer run on modern browsers. This will ease the need for constant development of your front-end applications in order to comply with ever-changing browsers.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2

    chaos.sh

    The breath of life for Artificial Intelligence.

    Full description: chaos.sh is a Bash script, what gives back 1(true) or 0 (false). It is written for AI (Artificial Intelligence) as a basic core script who gives the System the ability to make own decisions. The main idea is to use the quartz of the system clock instead a calculated random number algorithm. So, you have a real non calculable random Number. chaos.sh make the difference of a standard machine and life because it gives the system the quantumchaos effekt of real life based...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    ET: Legacy

    ET: Legacy

    A second breath of life for Wolfenstein: Enemy Territory

    ET: Legacy is based on the source code of the Wolfenstein: Enemy Territory which was released under the GPLv3 license. The main goal of this project is to fix bugs, remove old dependencies and make it playable on all major operating systems while still remaining compatible with the ET 2.60b version and as many of its mods as possible.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    RiskSuit

    This is for you if you are tired reading boring newsletters

    Risk management is a very complex and special area of everydays life. It can challenging and exciting as well. Imagine you climbed a tower and are standing at its edge on top. You have to watch every step and you will hold your breath in excitement. At this point you have to decide if you are willing to take the next step and with it the risk of failing and falling down. This is where the RiskSuit comes in. It is made to measure to fit your needs and saves you from any risk that may...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
    Learn More
  • Previous
  • You're on page 1
  • Next