Showing 4 open source projects for "thread java"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • Scheduling for Home Care Software Icon
    Scheduling for Home Care Software

    Home care agency owners, schedulers, nurses, managers, and caregivers searching for a solution to improve their operations

    Find the right caregiver for any client fast! Our database matches your caregivers with clients by skills, location, and availability. Monitor your leads and referral sources, with a complete history of your activities. You can even link your website to AdaCare's database. Keep records of all your staff, names, addresses, phone numbers, available hours, CEUs, and license expirations. Our "instant timecard" replaces paperwork, and sends alerts if caregivers are late. Less work, and better documentation. Your caregivers can sign in to view their schedules, calendars, maps, and more. Help your caregivers and your office staff. Print and export hours and mileage, for easier billing and payroll. Plus, reports and charts for managing your business. Secure and reliable, and you can work from anywhere, home, office, or in the field. Your caregivers can log in from home and print their own schedules and maps.
    Learn More
  • 1
    Chronicle Wire

    Chronicle Wire

    Low Garbage Java Serialisation Library that supports multiple formats

    Chronicle Wire is a Wire Format abstraction library. Chronicle Wire uses Chronicle Bytes for bytes manipulation, and Chronicle Core for low-level JVM access. Configuration includes aliased type information. This supports easy extension by adding new classes/versions, and cross-platform using type aliasing. By supporting types, a configuration file can bootstrap itself. You control how the configuration file is decoded. See example Queue Enterprise config. To send the configuration of a...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Logstash Logback Encoder

    Logstash Logback Encoder

    Logback JSON encoder and appenders

    Provides log back encoders, layouts, and appenders to log in JSON and other formats supported by Jackson. Supports both regular LoggingEvents (logged through a Logger) and AccessEvents (logged via logback-access). Originally written to support output in Logstash's JSON format, but has evolved into a highly configurable, general-purpose, structured logging mechanism for JSON and other Jackson data forms. The structure of the output, and the data it contains, is fully configurable. The general...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    A full-featured, lean set of date/ time classes to replace java.util's Date and Calendar. All objects are immutable/threadsafe, and allow formatting and various kinds of date math and range operations. Note that only GregorianCalendar is supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    J2J provides an intuitive way to convert Java to JSON and JSON to Java. Annotate any Java class then use JsonWriter to emit JSON from java or JsonReader to convert JSON to java objects. (source code and tutorial included) Version 2.0 in development.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cybersecurity Starts With Password Security. Icon
    Cybersecurity Starts With Password Security.

    Keeper is the top-rated password manager for protecting you, your family and your business from password-related data breaches and cyberthreats.

    Research shows that a whopping 81% of data breaches are due to weak or stolen passwords. Business password managers provide an affordable and simple way for companies to solve the single biggest root cause of most data breaches. By implementing Keeper, your business is significantly reducing the risk of a data breach.
    Get Started
  • Previous
  • You're on page 1
  • Next