Search Results for "previous version sgems2.1b 32 bits"

2 programs for "previous version sgems2.1b 32 bits" with 1 filter applied:

  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
  • Recruit and Manage your Workforce Icon
    Recruit and Manage your Workforce

    Evolia makes it easier to hire, schedule and track time worked by frontline in medium and large-sized businesses.

    Evolia is a web and mobile platform that connects enterprises with 1000’s of local shift workers and offers free workforce scheduling and time and attendance solutions. Is your business on Evolia?
  • 1
    Image16

    Image16

    Image viewer/editor specialized in astrophotography 16bits processing

    Opens/saves TIF, FITS, PNG, XISF, PXM, RAW, JPG, XCF, PSD. AsinH, Sqrt, Ln, Exp and Sqr stretching, HSL and RGB adjusting, Levels and Curves adjusting and Background Extraction for Color Balance, Flatness and Gradient Correction. Arithmetic between images. Resizing and croping. Color Balance based on background, selection or stars B-V (after platesolving). Debayering/Bayering. Inversion, mirroring, rotation, barrel/pincushion correction. RGB alignment/shifting. Erode, Dilate, ... Blurring...
    Downloads: 12 This Week
    Last Update:
    See Project
  • 2
    DEEEP

    DEEEP

    Detector of Integer Vulnerabilities in Software Portability

    ... are handled, and data-flow analysis is used to see if hazardous functions (eg. memcpy, strcpy) are accessible from outside the program. After this two analyses, the tool correlates the results from the previous phases to attain if the data that comes from the inputs are affected by vulnerabilities from porting to LP64, and if these are handled by dangerous functions (memcpy, strcpy,...). In resume, identify if the found bugs
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next