Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
$300 in Free Credit Towards Top Cloud Services
Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
...Version 1.0 was written in Borland Pascal in April 1996, and updated to v1.2 in June 1999. It was later rewritten to C++ in July 1999 through Jan 2000.
While it's been freely available since its creation, it's being released here as an open-source project so the world can better use it as it sees fit.
Version 2.0 is completely reworked in 2014 to compile and run with GCC and STL to make it fully portable and accessible to all computer platforms.
Elastolix takes any 2 of 6 elastic moduli and calculates the remaining 4. There is a command line tool, named elastolix and a tool with a graphical user interface made with lazarus. Releases for macOS will always be first, others should always follow shortly after.
Creates wallpapers on desktop, using great free program xplanet.
Shows planets of solar system on your desktop. Can change wallpapers automatically.
Has many customazible parameters for viewing various aspects of a planet.
Uses almost all power of great command-line tool xplanet.
tLISP is a small implementation of the LISP programming language written in Object Pascal. Includes tle a command line tool for working with the LISP environment, and dynamic library for calling LISP functions from other applications. tLISP 2 or dLISP is
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.