Showing 2 open source projects for "data entry program"

View related business solutions
  • Catch Bugs Before Your Customers Do Icon
    Catch Bugs Before Your Customers Do

    Real-time error alerts, performance insights, and anomaly detection across your full stack. Free 30-day trial.

    Move from alert to fix before users notice. AppSignal monitors errors, performance bottlenecks, host health, and uptime—all from one dashboard. Instant notifications on deployments, anomaly triggers for memory spikes or error surges, and seamless log management. Works out of the box with Rails, Django, Express, Phoenix, Next.js, and dozens more. Starts at $23/month with no hidden fees.
    Try AppSignal Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    csvSearch

    csvSearch

    A simple Python program to search a csv file

    csvSearch is a tiny python program that use a simple gui to search and copy data from a csv (comma separated value) file. All parameters can be provided on the command line, allowing quick launch using specific file and search parameters.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    iTelliHashCSV

    iTelliHashCSV

    Cryptographic Hashing Application for CSV Files

    iTelliHashCSV is a cryptographic “one-way” hashing application designed to securely protect sensitive or private information from disclosure. Proper use of this program allows organizations, businesses, and individuals (i.e., the data owners) to share complete/intact datasets containing sensitive data with others without actually disclosing the sensitive or private information. Additionally, if such datasets are subsequently modified or enhanced through value-added services or products provided by other organizations or individuals and then returned, the data owner retains the ability to “re-map” the hashed sensitive data values back to their original values.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB