5 projects for "duplicate code detect" with 1 filter applied:

  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    Build gen AI apps with an all-in-one modern database: MongoDB Atlas

    MongoDB Atlas provides built-in vector search and a flexible document model so developers can build, scale, and run gen AI apps without stitching together multiple databases. From LLM integration to semantic search, Atlas simplifies your AI architecture—and it’s free to get started.
    Start Free
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • 1
    JDiskCat

    JDiskCat

    Multi-platform disk cataloguing utility written in java.

    Easy-to-use multi-platform disk cataloguing program supporting local or removable media - drives and folders. Uses XML files as a data storage. It was originally created in 2010 to catalogue software compilations (also called freeware compilations) and CDs distributed with computer magazines. It was later improved to support any kind of disk and folder. It can be used to catalogue fragile disks like CDs, floppies, external hard drives, usb sticks, memory cards which are easy to damage....
    Leader badge
    Downloads: 34 This Week
    Last Update:
    See Project
  • 2
    ( pro ping )pinger network alert monitor

    ( pro ping )pinger network alert monitor

    Pinger alert, STATICTICAL TABLES, send EMAILs or SMS by SMS GATEWAY

    ...In addition, an audible alarm warns you via Telnet or SSH terminal, a log files recorded can be used to convey specific information to the system administrator. It is comes with a configurable for warning by email. lightweight code, coming with the source files, written in C, Email warning sender, ANDROID ping, SPARC, AMD64, traceroute, DETECT SOURCE Downs, Warning by Email, C language
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    DEEEP

    DEEEP

    Detector of Integer Vulnerabilities in Software Portability

    DEEEP is a open source static analysis tool to detect, in C programs, integer vulnerabilities caused by the bad adaption of aplications from ILP32 to LP64. It uses the tools Lint and Splint, and runs over Open Solaris and Linux operating systems. This tool semantically analyses source code. More precisely, it does type checking, data-flow analysis, and it automatically correlates the results of these two types of analysis.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Mouse Rate

    Mouse Rate

    OS independent mouse rate checker written in Java.

    ...Java 7u40 or higher needed to run version 1.2 and higher. **Version 1.3 changes - Fixed graphic artefacts appearing while program window is dragged. **Version 1.2 changes - Major code review & cleanup - Mouse watching algorithm optimized - Duplicate cursor statistics calculations removed & rewritten - Automatic focus regain removed - Redundant .exe removed, now there is one jar for every java-supported OS.
    Downloads: 22 This Week
    Last Update:
    See Project
  • Inventors: Validate Your Idea, Protect It and Gain Market Advantages Icon
    Inventors: Validate Your Idea, Protect It and Gain Market Advantages

    SenseIP is ideal for individual inventors, startups, and businesses

    senseIP is an AI innovation platform for inventors, automating any aspect of IP from the moment you have an idea. You can have it researched for uniqueness and protected; quickly and effortlessly, without expensive attorneys. Built for business success while securing your competitive edge.
    Learn More
  • 5

    Free-SA

    Free-SA is report generating tool for web, proxy and mail log files

    Free-SA is logs processor and report generating tool. It can be used to control traffic usage, to evaluate conformance to the Internet access security policies, to investigate security incidents, to evaluate web server efficiency and to detect troubles with server configuration.
    Downloads: 4 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next