Showing 2 open source projects for "coffee-bytes"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1
    Hacker Scripts

    Hacker Scripts

    Based on a true story

    ...The repository gathers playful utilities (originally shell and Ruby scripts) that automate short, real-world tasks — for example, sending a quick “late at work” text when SSH sessions are active, firing off an automated “I’m sick / working from home” email on certain mornings, or even talking to a networked coffee machine to start brewing at precisely the right moment. The README explains the origin story and highlights several canonical scripts and provides usage notes such as required environment variables and cron examples for scheduling. Contributors have provided implementations and ports in many languages and folders (shell, Ruby, Python, Node, Perl, PowerShell, Go, Java, etc.), and the project explicitly welcomes pull requests that add additional language implementations.
    Downloads: 179 This Week
    Last Update:
    See Project
  • 2
    OnAccessFileEncryption

    OnAccessFileEncryption

    EaseFilter OnAcess File Encryption SDK

    Transparent file encryption performs real-time I/O encryption and decryption of the files in any block data with 16 bytes. The encryption uses a 256 bits symmetric key to encrypt or decrypt the data with AES encryption algorithm. Auto file encryption protects data "at rest", meaning the transparent data and files encryption. It provides the ability to comply with policies which can be applied by users, processes and file type. This allows only authorized users and processes to access the encrypted files, unauthorized users and processes can’t access the encrypted files. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB