Showing 6 open source projects for "delphi memory dump"

View related business solutions
  • Recruit and Manage your Workforce Icon
    Recruit and Manage your Workforce

    Evolia makes it easier to hire, schedule and track time worked by frontline in medium and large-sized businesses.

    Evolia is a web and mobile platform that connects enterprises with 1000’s of local shift workers and offers free workforce scheduling and time and attendance solutions. Is your business on Evolia?
  • Find out just how much your login box can do for your customer | Auth0 Icon
    Find out just how much your login box can do for your customer | Auth0

    With over 53 social login options, you can fast-track the signup and login experience for users.

    From improving customer experience through seamless sign-on to making MFA as easy as a click of a button – your login box must find the right balance between user convenience, privacy and security.
  • 1
    jCasbin

    jCasbin

    An authorization library that supports access control models

    An authorization library that supports access control models like ACL, RBAC, ABAC for Golang, Java, C/C++, Node.js, Javascript, PHP, Laravel, Python, .NET (C#), Delphi, Rust, Ruby, Swift (Objective-C), Lua (OpenResty), Dart (Flutter) and Elixir. In Casbin, an access control model is abstracted into a CONF file based on the PERM metamodel (Policy, Effect, Request, Matchers). So switching or upgrading the authorization mechanism for a project is just as simple as modifying a configuration...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    Baya - SoC Integration Platform

    Baya - SoC Integration Platform

    Best in class SoC Integration Platform, IP-XACT, Verilog VHDL, UPF

    ... with advance queries 8. Hierarchy Manipulation to create Power Domain, Voltage Domain, comply with Floor planning 8.a. Insert new hierarchy 8.b. Remove existing hierarchy 9. Associate the IP-XACT memory maps with the SoC component instances 10. Dump out the C Model for the entire design 11. Glue-Logic insertion 12. Spare port insertion across hierarchies 13. Automatic creation of the top module and it's ports based upon specified rule 14. Creates stub module
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3
    AL-IV

    AL-IV

    ALFOUR Programming language. Simple, safe, power, multi-platform.

    A programming language AL-IV (ALFOUR) is a high-level imperative object oriented programming language with minimal introduction level, easy porting to any platform claiming a very high level of safety and stability, with a controllable level of code protection, high efficiency of an executable code, full independence from a target platform, minimal enter level.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    xowa

    xowa

    A free, open-source, offline Wikipedia application

    XOWA is a desktop application for reading and editing Wikipedia offline (XOWA has moved to http://gnosygnu.github.io/xowa/download.html)
    Downloads: 2 This Week
    Last Update:
    See Project
  • Multi-Site Network and Cloud Connectivity for Businesses Icon
    Multi-Site Network and Cloud Connectivity for Businesses

    Internet connectivity without complexity

    As your users rely more and more on Cloud and Internet-based technologies, reliable internet connectivity becomes more and more important to your business. With Bigleaf’s proven SD-WAN architecture, groundbreaking AI, and DDoS attack mitigation, you can finally deliver the reliable internet connectivity your business needs without the limitations of traditional networking platforms. Bigleaf’s Cloud Access Network and plug-and-play router allow for limitless control to and from anywhere your traffic needs to go. Bigleaf’s self-driving AI automatically identifies and adapts to any changing circuit conditions and traffic needs—addressing issues before they impact your users. Bigleaf puts you in the driver’s seat of every complaint and support call with full-path traffic and network performance data, delivered as actionable insights, reports, and alerts.
  • 5
    Similar Image Search

    Similar Image Search

    Reverse image search your photos. Find duplicates. Find similars

    Similar Image Search is a desktop reverse image search app. Think Google's "search by image" but with your own photos on your computer. SiS can search for similar images in the library and return a list of matches. I can also compare ones outside the library to ones within. It's designed for photographers to sift through a memory card dump, searching for photos in batches for ease of sorting. Requires: Java 7
    Downloads: 5 This Week
    Last Update:
    See Project
  • 6

    Java Secure String

    Java class for secure long-term in memory storage of sensitive strings

    A compact fast performing Java class SecureString enables long-term storage of sensitive strings that is resilient against a privileged insider, i.e. makes it hard to introspect its content from a memory dump. Click the home page link for a white paper with details and discussion on the subject of in-memory storage of sensitive data in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next