Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.
Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
Managing your therapy and rehab practice is a time-consuming process. You spend hours on paperwork, billing, scheduling, and more. Raintree’s Therapy & Rehab EHR is here to help you manage your practice more efficiently. With our all-in-one solution, you’ll get the tools you need to streamline your therapy and rehab practice, improve patient care, and get back to doing what you love.
P53 Cancer Rescue Project, University of California, Irvine , Samuel A. Danziger, Christopher Wassman, Faezeh Salehi Amiri, Roberta Baronio, Linda Hall, Rainer K. Brachmann, G. Wesley Hatfield, Peter Kaiser, Richard H. Lathrop
A framework for the visualization of multi-layer networks
MuLaViTo is a multi-layer visualization framework which allows to visualize relations between multiple graphs in derived applications. Moreover, it provides helpful means like k-shortest path algorithms, running algorithms in a separate thread, ...
K people is a software platform capable of integrating with enterprise systems. It enables workers to improve productivity, while giving management the the means to plan and monitor activity.
Tipalti delivers smart payables that elevate modern business.
Our robust pre-built connectors and our no-code, drag-and-drop interface makes it easy and fast to automatically sync vendors, invoices, and invoice payment data between Tipalti and your ERP or accounting software.
Pronounced "Open Spippy" (like "skippy" but with a "p" instead of a "k"): A reference implementation of the Session Peering Provisioning Protocol binding for SOAP being developed in the IETF's DRINKS Working Group.
This project concerns K-MADe (Kernel of Model for Activity Description environment), a tool for contributing to the incorporation of ergonomics into the interactive systems design process, through task and activity analysis.
SimulME is a Java ME (J2ME) application with Queueing calculator, Stopwatch, Monte Carlo simulation, Random Number Generator (RNG), Probability distributions, Kolmogorov-Smirnov and Chi-square tests. It works with MIDP 2.0 and CLDC 1.1 profiles.
Decimal floating point library in Java. Provides decimal floating point math for Java via a clean, easy to understand implementation. Much easier to use than Big Decimal, nearly IEEE-854 compliant. Compatible with J2ME, so it can be used on PDAs/phon
Almond Java Application Framework is an easy to use Swing based framework for Java applications. Almond is very much inspired by the K Desktop Environment.
As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
Sar-K is a Java tool to generate code for user interfaces, model classes and data access layer based on a database model. Sar-K can access many database engines and produces code in many languages and architectures using customizable templates.
An implementation of "k-Way Merging" as described in "Fundamentals of Data Structures" by Horowitz/Sahni. NOTE: This project has been moved to http://code.google.com/p/kway/
RepeatMap is a collection of time/memory efficient algorithms and data structures to enable rapid counting & querying of kmers (sequences of length k) counts in large sequences. E.g. a query could be "how many times is 'ACGTCATGGTAC' found in a genome."
James Burke's Knowledge Web is a powerful, interactive and intuitive omnipedia. It allows users to fly through an online universe of data to discover how seemingly unrelated people, events and ideas are connected across time and space.
Open Anonymizer protects sensitive data by generalizing data records in order to create data twins that mask the identity of individuals. It is based on the concept of k-anonymity .
Escape-K is an open-source IT management platform. It is designed to be used by IT services and provides a complete set of features for both technical and user services management. Using a single user interface, Escape-K lets you manage your whole IT inf
gaKnn(Genetic Algorithm Optimized K Nearest Neighbor Classification framework) is a frameowork for KNN optimization with a genetic algorithm. The genetic algothm used for this is JGAP (http://jgap.sourceforge.net/).
ParGeL is an LALR(k) parser generator, which allows creation of inheritable parsers in runtime and compile time environments. ParGeL is written 100% in Java.
An execution engine for Linked Object Oriented Programming (L.O.O.P.). L.O.O.P. adds EXTERNAL LINK property for original OOP, which can make objects link, pass data to each other without knowing the other object's information.
KMush is a simple MU* client intended for the K Desktop Environment. It is written in Java using the Qt Jambi bindings. Its intended use is for soft-coding and role-playing in MUSH environments.
K-automaton is a new parsing (syntactic analysis) machine isomorphous to language. Implemented in Java. Can generate Java code from grammars described in EBNF.
An implementation of Shoup's "Practical Threshold Signature" in Java. This is an (n,k)-threshold signature system: at least k parties out of n must independently sign a piece of data to produce a valid group signature.