Search Results for "desktop application in java source code"

Showing 4 open source projects for "desktop application in java source code"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • 1
    UVA Arena

    UVA Arena

    UVA Arena is a utility application to practice problem solving.

    UVA Arena (c) 2014, is a windows based, non-commercial, open source utility application to make problem solving easier for the programmers. It is based on popular UVA Online Judge and uses APIs from uHunt. Main target of this software is to provide an useful and informative tool to help with programming practice. Today programming has become a very competitive field. You need to keep track of your progress daily, learn new things, and of-course solve new problems as fast as you can....
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    BinaryCrypt

    BinaryCrypt

    Binary Conversion Calculator

    With BinaryCrypt, you can convert between regular text, binary, hexadecimal, octal decimal and decimal. You can convert only decimal (as of right now) to any base up to base 64. You can also save your converted text to a file or open a converted text file to decrypt the message, and perform basic arithmetic in binary. The git repo for the C# code is located at: https://github.com/m1r4g3/BinaryCrypt-.Net
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Online Examination Portal in asp.net and

    Online Examination Portal in asp.net and

    Online Examination System [Multiple Choice]

    Please Read "read_me" file first before using this project. Remember: This Project is designed in VS2012 x64 and database is designed in sql server 2012 x64. Suggestion: Put following code in web.config files in <forms> tag to save password in encrypted format <credentials passwordFormat="SHA1"></credentials> New Feature - Create new category of question from front-end. Explore and Rate this web-application and suggest me for better practices....
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4

    Font Converter

    It is a tool coverts unicode Kartika Malayalam to ISFOC Malayalam

    Font Converter is a utilty for windows XP, Windows 7, Windows 8 and Windows 10 that converts Unicode(UTF-16) Kartika Malayalam paragraphs(Usually written in web and output of Google input tools) to ISFOC ML-TT font paragraphs. The output of this program can be used in Malayalam Notice/Poster/Any designs this will make the designs look stylish and amazing.. Don't worry if your browser shows this download could harm your computer, Its due to missing of Digital Signature. Administrator...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Previous
  • You're on page 1
  • Next