Showing 2 open source projects for "c-like"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • SIEM | API Security | Log Management Software Icon
    SIEM | API Security | Log Management Software

    AI-Powered Security and IT Operations Without Compromise.

    Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
    Learn More
  • 1
    EdgeDB

    EdgeDB

    A next-generation graph-relational database

    ...It aims to solve some hard design problems that make existing databases unnecessarily onerous to use. Powered by the Postgres query engine under the hood, EdgeDB thinks about schema the same way you do: as objects with properties connected by links. It's like a relational database with an object-oriented data model, or a graph database with strict schema. We call it a graph-relational database. The core unit of schema in the graph-relational model is the object type, analogous to a table in SQL. Object types contain properties and can be linked to other object types to form a schema graph.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2
    ...Po piewszym wykonaniu programu, zostaje utworzony katalog Data, w miejscu gdzie zapisany jest program. Aby wybrać ścieżkę do katalogu z obrazami należy w pliku 'settings.txt' zapisać ścieżkę. Następnie można wykonywać program z: -an, -mnb, -c, -i Link do GitHub: https://github.com/Duke-Axer/Duplicate-Finder Wszystkie pytania proszę pisać na b.gabka.nkn@gmail.com
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next