Showing 4 open source projects for "cpu-g"

View related business solutions
  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
  • Gain insights and build data-powered applications Icon
    Gain insights and build data-powered applications

    Looker is an enterprise platform for BI, data applications, and embedded analytics that helps you explore and share insights in real time.

    Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
  • 1
    POCO

    POCO

    Cross-platform C++ libraries for building network applications

    The POCO C++ Libraries are powerful cross-platform C++ libraries for building network- and internet-based applications that run on desktop, server, mobile, IoT, and embedded systems. Whether building automation systems, industrial automation, IoT platforms, air traffic management systems, enterprise IT application and infrastructure management, security and network analytics, automotive infotainment and telematics, financial or healthcare, C++ developers have been trusting the POCO C++...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    CT4AM

    CT4AM

    Tools for 3D image analysis of additively manufactured parts

    CT4AM is a cross-platform toolkit for 3D-image processing in the domain of additive manufacturing for toolpath visualisation or correlation to tomographic data and related materials science. It is written in C++ and provides small, problem-specific applications for viewing, analysing and visualising of volumetric data from micro-CT scans with respect to the complex process parameters and characteristics of additive manufacturing. Moreover, data analysis and processing of G-code are key assets...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Eventer

    Eventer

    Rapid, unbiased, reproducible analysis of synaptic events

    ... procedures. The software is coded in MATLAB, but has been compiled as standalone applications for Windows, Mac and Linux. Please visit the official Eventer website for more info https://eventerneuro.netlify.app/ While the paper is in preparation, please cite as; Winchester, G., Liu, S., Steele, O.G., Aziz, W. and Penn, A.C. (2020) Eventer. Software for the detection of spontaneous synaptic events measured by electrophysiology or imaging. http://doi.org/10.5281/zenodo.3991676
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    X-SOCS

    X-ray Strain Orientation Calculation Software

    The X-ray Strain Orientation Calculation Software (X-SOCS) is a user-friendly software, developed for automatic analysisof 5D sets of data recorded during continuous mapping measurements. X-SOCS aims at retrieving strain and tilt maps of nanostructures, films, surfaces or even embedded structures. For more information: http://scripts.iucr.org/cgi-bin/paper?S1600576714004506 To download the latest version of XSOCS (D. Naudet, T. Vincent, M.I. Richard, G. Chahine), follow the instruction...
    Downloads: 0 This Week
    Last Update:
    See Project
  • The Secure Workspace for Remote Work Icon
    The Secure Workspace for Remote Work

    Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

    Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
  • Previous
  • You're on page 1
  • Next