Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Custom VMs From 1 to 96 vCPUs With 99.95% Uptime
General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.
Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
Open source predictive text entry system from CDAC, Mumbai
Anumaan is a predictive text entry system developed by CDAC, Mumbai, India. It gives context sensitive text prediction. Hence, it helps in effective text entry. It is intended for people suffering from different kinds of motor disabilities.
New version of standalone flavor of Anumaan (Anumaan-standalone-0.2) has been released.
Feedback, feature enhancement requests about the application can be sent to ossd[at]cdac[dot]in or predictanumaan[at]gmail[dot]com.
JListenToMe lets you take control of eSpeak so comfortable, thanks to its friendly graphical interface and easy configuration. It is too easy and the best, is free software!.
BlackScreen is a cross platform application that makes your monitor look black, no desktop, icons, or even your cursor. It's a great way to prank your family, and friends. Go ahead, and give it a try, just don't get the crap beat out of you :)
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
VEDICS (Voice Enabled Desktop Interaction and Control System) is an assistive software which lets the user to interact with the OS using voice commands. Using this software the user can access any element found on the user's screen.
littleface is MVC j2ee framework,also has its own permanent layer.At present,support oracle, mysql. so using very simple, i hope you like to join. new :security authentication framework can be configured
BioAcceso es un sistema para el control de asistencias de los empleados, tomando la huella dactilar del personal para su registro e identificación. Es una aplicacion de escritorio desarrollada con el lenguaje Java, utlizando Mysql Server como RDBMS.
LanOS Open Edition is a tool with an user interface that assists the use of the Linux Ubuntu in Lan Houses, Cyber Coffees and other establishments of public access.
mcuStudio is a development environment for Microcontrollers. It's based on Eclipse (plugin). The aim is to provide a high quality development environment for electronics. First editions will target Microchip Pic mcu's. Other mcu will be supported later.
java-gnome is a set of Java bindings for the GTK widget toolkit and to the various libraries making up GNOME. java-gnome is part of the GNOME Bindings release set.
Openmark will be a Open Source benchmark that will have 32/64 bit options for video rendering tests on X11 as well as HD speed, FSB, etc benchmarks. Also many tools like: temp monitor, speed control, etc.
This project final target is to provide a layer of abstraction between Java and modern desktop operationg system (win32,KDE,Gnome).
Actually the first phase of this project will be to create a bridge between Java and Win32 automation.
CDMirror is a a suite for reading, recording, converting between cd images and blanking cds with a friendly user interface - made with Java-Gnome. These operations are performed with an internal java library made in JNI (made from scrach).
ObscureEncrypt is a high level security encrypter. It encrypts at three levels, 448 bit Blowfish encryption, Obscurity, high level encryption. Making it almost impossible to decrypt