AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Try it Free
Build Securely on AWS with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
A fast, simple method of establishing musical genre of arbitrary compressed audio files calculated by comparisons with training sets. Program currently consists of a java console program. GUI front end, algorithm upgrades to come.
I needed a library of functions that enabled me to perform hash
functions and symmetric cryptography. I chose MD5 initially but
eventually chose SHA as the hashing algorithm due to concerns regarding
the \'collision resistance\' of MD5 due to weakne
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
a java chat system, that encrypts all transfered data to protect the users privacy. Encryption will be done by rsa, blowfish, 3ds or an easy 'exclusive or' encryption. the client will hava a complete gui, the server in addition a console frontend.
Unfixed bugs delaying your launch? Test with real users globally – check it out for free, results in days.
Testeum connects your software, app, or website to a worldwide network of testers, delivering detailed feedback in under 48 hours. Ensure functionality and refine UX on real devices, all at a fraction of traditional costs. Trusted by startups and enterprises alike, our platform streamlines quality assurance with actionable insights. Click to perfect your product now.
A small chat Program written in Java, which allows you to speak "privately" to other users. It shall get an encryption and a compression. I plan to integrate a dcc-like file-transfer
'Einsatz' is a free Java based application to plan medical services. Using the 'Maurer Algorithm' it calculates the staff and equipment you need for services like sporting events or concerts.
This project comprises a collection of libraries and applications for the field of program analysis. The starting point is a type analysis for Java programs using Agesen's Cartesian Product Algorithm.
Picsart Enterprise Background Removal API for Stunning eCommerce Visuals
Instantly remove the background from your images in just one click.
With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
MAGMA: Multiobjective Analyzer for Genetic Marker Acquisition
A genetic algorithm for generating SNP tiling paths from a large SNP database
based on the competing objectives of cost (number of SNPs) and coverage (haplotype blocks):
Hubley R., Zitzler
This toolbox is designed to make implementations of voting systems freely available in Java. It will initially have software for Single Transferrable vote (Meek algorithm), but others may be included.
A Java library for validation of credit cards. Implements the Luhn Algorithm to ensure the card number is well formed, checks card type prefix's and length. The rules are stored in a text file allowing new cards to be added without changing the source
OpenLabel is a label placement tool and decluttering algorithm for OpenMap. Labels are placed in full conformance with applicable cartographic specifications and conventions - without overlap or ambiguity.
Jayenne is a modular, secure, scalable, easy to use and lightweight webserver wirtten in java, that supports encryption (SSL) and scripting languages like Perl.
SysK allows to crypt text by using system informations calculate the algorithm.
For each user,the crypt algo will be different.
It's written in C language for Linux x86.
The objective is to allows it to crypt streams, binaries and more.
Java port and extension of MLC++ 2.0 by Kohavi et al. Currently contains ID3, C4.5, Naive (aka Simple) Bayes, and FSS and CHC (genetic algorithm) wrappers for feature selection. WEKA 3 interfaces are in development.
Passkeyper is an encrypted password keeper program for the Sharp Zaurus and runs in the PersonalJava environment. It uses the legendary BlowfishJ implementation of Blowfish for encryption.
A Java Swing application to 'securely' store passwords using symmetric encryption. A user can set up one or many 'datastores' of password/username combinations and commit them to disk. They are stored on the file system using PBE Blowfish.
- development stopped! - GATMAN - The first known combination of a network/user administration and a groupware solution - Latest technologies such as JAVA,XML,JSP and strong encryption are used - Modular design, high scalability - Accessible by client an
Hyperfile provides an easy-to-use and flexible interface to power and maintain highly dynamic user-defined data sources. The data sources are stored using a secure and reliable encryptionalgorithm.