• Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. Icon
    It protects your internal resources such as behind-the-firewall applications, teams, and devices.
  • Gain insights and build data-powered applications Icon
    Gain insights and build data-powered applications

    Looker is an enterprise platform for BI, data applications, and embedded analytics that helps you explore and share insights in real time.

    Chat with your business data with Looker. More than just a modern business intelligence platform, you can turn to Looker for self-service or governed BI, build your own custom applications with trusted metrics, or even bring Looker modeling to your existing BI environment.
  • 1
    S2 Recovery Tools for Microsoft Word

    S2 Recovery Tools for Microsoft Word

    Brings into one place MS methods for recovering files that won't open

    Microsoft recommends methods for recovering corrupt Word files that won't open. This software provides buttons to easily invoke these as well as providing 5 independent methods for recovering and opening corrupt Microsoft Word DOC & DOCX files. Additionally the program provides links to two pieces of freeware not coded by the author, a free service (if you can wait 14 days!) and a featured commercial solution (which is an affiliate of the author's). Also it has its own native previous...
    Leader badge
    Downloads: 15 This Week
    Last Update:
    See Project
  • 2
    Savvy Repair for Microsoft Office

    Savvy Repair for Microsoft Office

    Repairs/Recovers Corrupt MS Office 2007 - 2013 Format Files

    DOCX, XLSX and PPTX files are collections of conventionally zipped mostly XML sub-files. This program first attempts repair any zip based corruption. From there it engages in four different algorithmic attempts at repair or recovery. With the first method using validation, the location of the first XML error is sought. At that point the sub-files are truncated and repaired. The second method works the same way except the XML validation is more lax. With the third, the strict XML...
    Downloads: 9 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next