Showing 3 open source projects for "add to run"

View related business solutions
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines on Google’s infrastructure.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
  • Cybersecurity Management Software for MSPs Icon
    Cybersecurity Management Software for MSPs

    Secure your clients from cyber threats.

    Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
  • 1
    internet-control

    internet-control

    Control how long your childs computer is connected to the internet

    internet-control is a very special implementation of parental control. It allows the child to be productive at the computer while lowering the danger of addiction to a minimum. Instead of restricting the time the computer may be used, it allows parents to restrict the time the computer may be connected to the internet. This way the child is still able to do its homework at the computer, but the danger of addiction to a game or social media application is minimised - the unpredictabillity...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    51Degrees-C

    51Degrees-C

    Mobile Device Detection for C and C++

    Add mobile device detection to your C or C++ program the easy way with 51Degrees. No cloud services, no external plug-ins, all Mozilla Public License source code. It's a great alternative to WURFL or DeviceAtlas. 1. Download and extract. 2. Run the setup file. 3. Import the code into your project or call the compiled executable as a process. Visit http://51degrees.com/Support/Documentation/APIs/C.aspx to get the full setup guide. The zip file contains a batch file for easy...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    Feathery is a very small and full-featured ftp server for embedded devices. It is easy portable to every 8, 16 or 32 bit architecture and can run with or without an operating system.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next