Showing 2 open source projects for "36.../"

View related business solutions
  • The #1 Embedded Analytics Solution for SaaS Teams. Icon
    The #1 Embedded Analytics Solution for SaaS Teams.

    Qrvey saves engineering teams time and money with a turnkey multi-tenant solution connecting your data warehouse to your SaaS application.

    Qrvey’s comprehensive embedded analytics software enables you to design more customizable analytics experiences for your end users.
    Try Developer Playground
  • Manage printing in a cost-efficient and eco-friendly way with Gelato. Icon
    Manage printing in a cost-efficient and eco-friendly way with Gelato.

    Gelato offers an extensive catalog of custom products, a zero-inventory business model, and free designing tools—all in one place.

    The world's largest print on demand network with 140+ production partners across 32 countries. Gelato offers end-to-end design, production and logistics for individuals looking to start their own business today!
    Sign up for Free
  • 1
    Tria Sistema Operatiu

    Tria Sistema Operatiu

    Helps you find, download & burn the best Operating System for any PC

    Tria O.S. detects hard & soft specs of the PC where you run it, you can load this info or specify it manually to let the program inform you what would be the best operating system for a specific PC, with the specified hardware, and then see the difference by adding RAM, a SSD hard drive, changing the graphics card ... etc. REQUIREMENTS: For Linux, you need GAMBAS 3.3 or later, so you will have to install the gambas3 package before installing. 90's EDITION needs 160 MB (192 MB on...
    Downloads: 3 This Week
    Last Update:
    See Project
  • 2
    USE secure operating system

    USE secure operating system

    a secure, open source OS for use inside USEagency facilities

    ... and signature-based virus scan. After that, they will be placed in a leveled security storage space, each more secure--with the most secure being 50. Under 50 will be 46-49; under that is 36-45; under that is 27-25; under that is 26; under that is 14-25; under that is 6-13; under that is 5-3; lastly there is level 2 the most insecure. The operating system itself will require many passwords: boot up, access logon screen, login, admin, and more/ Mainly, it will be built with strong security as its base
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next