One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Stop Cyber Threats with VM-Series Next-Gen Firewall on Azure
Native application identity and user-based security for your Azure cloud
Gain integrated visibility across all traffic in a single pass. Deploy Palo Alto Networks VM-Series to determine application identity and content while automating security policy updates via rich APIs.
Moodss is a modular monitoring application, composed of a GUI and a daemon, which supports any device or process for which a module can be developed. Complete dashboards with graphical viewers, thresholds, SQL database archiving, ... can be managed.
ListEd: command listings. Just download the thing. You'll see what happens in the program when it's done installing. And the install auto-loads the readme. Please enjoy.
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
SQLiteDBMS is a database management server for SQLite. It allows an sqlite3 process to be accessed via a TCP/IP network. It provides Extended SQL, SSL, basic authentication, query caching, WebDAV, access control, and replication. http://sqlitedbms.sf.net
Fast data loading from DBF ( dbf , xBASE , Clipper ) files of arbitrary structures into RBDMS Oracle. Excellent for mass files loading. May be the fastest tool possible. Automatic tables creation from dbf files. No problems with reserved words.
The Peach Validator is a small program used verify the application of the Lhun's algorithm to s.i.n numbers. This program is designed to offer some insight into writting program wrappers or GUI applications with python.
PIMPPA is a toolkit to automatically retrieve, skip, sort, process
and backup binary files (pictures, music, animations, etc.) from the
Internet. Primary file source is newsgroups, more loosely FTP and IRC.
A self-contained database application development environment. The application is defined within the database and operates upon the same database. It generates a web-based interface for users to manipulate the data, and a pytcl development tool.
CRel is an object relational data store for C programs. Based on a
structure data specification in XML or autogen, it generates code to
store and access the data object. It supports indexing, constraints,
memory management and serialization.
The BEE Project is a suite of tools supporting Business Intelligence project implementation including ETL tool and OLAP server and a thin client. The ROLAP server ensures multipass SQL generation and powerful cache management (utilizes MySQL RDBMS).
Alexandria is an archive system for large data amounts. Suitable for inhomogenous collections of books, media files, art items and other artifacts. Main focus is on easy usage, small executable file and portability.
KmusicdB is a music information manager for KDE3 and a PostgreSQL database. You can add your music collection and browse through it in a customizable viewer. KmusicdB includes CDDB support, reports and searching. This is not an MP3 manager.
KInterbasDB is a Python DB API 2.0 module for the relational databases Firebird and Interbase. KInterbasDB also exposes most of the native client API of the database engine, including two-phase commit, server-side events, and an administrative API.
3store is an RDF "triple store", written in C and backed by MySQL and Berkeley DB. It is an optimisation and port of an older triple store (WebKBC). It provides access to the RDF data via RDQL or SPARQL over HTTP, on the command line or via a C API.
cpm is a small console tool to manage passwords and store them public key encrypted in a file - even for more than one person.
The encryption is handled via GnuPG so you can access the programs data via gpg as well.