Showing 5 open source projects for "corruption"

View related business solutions
  • Auth0 for AI Agents now in GA Icon
    Auth0 for AI Agents now in GA

    Ready to implement AI with confidence (without sacrificing security)?

    Connect your AI agents to apps and data more securely, give users control over the actions AI agents can perform and the data they can access, and enable human confirmation for critical agent actions.
    Start building today
  • Automate contact and company data extraction Icon
    Automate contact and company data extraction

    Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.

    Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
    Explore Apify Store
  • 1
    WCDB

    WCDB

    Cross-platform database framework developed by WeChat

    ...ORM/persistence solution via Room from Android Architecture Components. Concurrent access via connection pooling from modern Android framework. Repair toolkit for database corruption recovery.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    VictoriaMetrics

    VictoriaMetrics

    VictoriaMetrics: fast, cost-effective monitoring solution

    VictoriaMetrics is a fast, cost-effective and scalable monitoring solution and time series database. VictoriaMetrics is available in binary releases, Docker images, Snap packages and source code. Just download the latest version of VictoriaMetrics. VictoriaMetrics is developed at a fast pace, so it is recommended periodically checking the CHANGELOG and performing regular upgrades. It can be used as long-term storage for Prometheus. See these docs for details. It can be used as a drop-in...
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    asami

    asami

    A flexible graph store, written in Clojure

    Asami is now being developed in this repository, as it is no longer being supported at Cisco. The deployment to Clojars has not changed, as it was always to my personal account.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    seladb/pickledb-rs

    seladb/pickledb-rs

    PickleDB-rs is a lightweight and simple key-value store

    PickleDB-RS is a lightweight, fast, and key-value store written in Rust. Inspired by the Python PickleDB, it provides a simple, NoSQL database for small applications that require persistent key-value storage without the overhead of full-fledged databases. It is designed for speed and ease of use, with a JSON-based storage format.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software. Icon
    Axe Credit Portal - ACP- is axefinance’s future-proof AI-driven solution to digitalize the loan process from KYC to servicing, available as a locally hosted or cloud-based software.

    Banks, lending institutions

    Founded in 2004, axefinance is a global market-leading software provider focused on credit risk automation for lenders looking to provide an efficient, competitive, and seamless omnichannel financing journey for all client segments (FI, Retail, Commercial, and Corporate.)
    Learn More
  • 5
    goleveldb

    goleveldb

    LevelDB key/value database in Go

    ...OpenFile uses standard file-system backed storage implementation as described in the leveldb/storage package. OpenFile will return an error with type of ErrCorrupted if corruption is detected in the DB. Use errors.IsCorrupted to test whether an error is due to corruption. Corrupted DB can be recovered with Recover function. CompactRange compacts the underlying DB for the given key range. In particular, deleted and overwritten versions are discarded, and the data is rearranged to reduce the cost of operations needed to access the data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next