Showing 7 open source projects for "cache proxy java"

View related business solutions
  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • Pest Control Management Software Icon
    Pest Control Management Software

    Pocomos is a cloud-based field service solution that caters to businesses

    Built for the pest control industry, but also works great for Mosquito Control, Bin Cleaning, Window Washing, Solar Panel Cleaning, and other Home Service Businesses in need of an easy-to-use software that helps you simplify routing, scheduling, communications, payment processing, truck tracking, time tracking, and reporting.
    Learn More
  • 1
    Fen2Pdf

    Fen2Pdf

    Tool for chess teachers to create PDF files with chess diagrams in it

    Tool for chess teachers to create PDF files with chess diagrams in it. 1) Create a pgn file with chess diagrams (FEN notation) in it (e.g by using lichess) 2) Open the Fen2Pdf and select the folder containing the pgn(s) 3) Click start. Fen2Pdf detects the pgn files in it and creates a pdf file You can now print this file and hand the exercises over to your students Extra features: * Mirror the positions. This is handy if you want the same problems presented for the other color...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    JCSprout

    JCSprout

    Basic, concurrent algorithm

    JCSprout is a curated learning path for Java engineers that mixes concise notes, diagrams, and runnable examples to cover core computer science and JVM topics. It walks readers through data structures and algorithms, networking fundamentals, Java concurrency, JVM memory model and GC, and common interview problem patterns. The repository emphasizes understanding over memorization, linking conceptual summaries with small code artifacts that can be compiled and profiled. It also highlights best...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    JavaScript Database Proxy: proxy to jdbc api in javascript.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Acoma process email communication on server or desktop side and attach relevant information from various sources to an email messages. It can be used within any email client or mobile device since it is hooked up to email as a proxy to SMTP or POP3.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place. Icon
    Incredable is the first DLT-secured platform that allows you to save time, eliminate errors, and ensure your organization is compliant all in one place.

    For healthcare Providers and Facilities

    Incredable streamlines and simplifies the complex process of medical credentialing for hospitals and medical facilities, helping you save valuable time, reduce costs, and minimize risks. With Incredable, you can effortlessly manage all your healthcare providers and their credentials within a single, unified platform. Our state-of-the-art technology ensures top-notch data security, giving you peace of mind.
    Learn More
  • 5
    JPACS, Java Processor and Cache Simulator, was developed to give a simple and clear tool to simulate a processor with a complete associative memory cache at ISA level, using direct memory access or using a program written in assembly.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Simulating Cache based Checkpointing and Rollback schemes are currently performed only at the hardware level for the lack of such simulation software that is generic. NCkptSimulator, a simulation tool, will support different checkpointing schemes
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Enables a user to view & alter all aspects of comunications with a web site via a proxy. Primarily used for security based penetration testing of web sites, it can also be used for debugging during development. Seen as part of a hacker toolkit.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next