Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
MongoDB Atlas runs apps anywhere
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
MOBIDICK (MOdular But IntegrateD applICation frameworK) is dedicated to gather as less as possible Java frameworks in order to complete full needs of large business application and allow regeneration of code, even when java frameworks change.
A little tool writen in java to trace the execution plan for a given database query. It works with Oracle 10g or higher and uses the JGoodies look and feel. You need to provide the Oracle.com JDBC-Driver and the JGoodies.org looks look and feel.
Source is now located at Github https://github.com/mgeiss/oraxtra.
A Portable Thin Client & Server Pair for XA / 2PC Testing
A portable testing tool to validate the configuration of XA and two-phase commit for Java EE 6 Containers. The tool permits the stress-testing, performance characterization and correct transaction semantics of distributed transactions across Three XA resource managers by Exception Injection. The thin-client can be run from the command-line or inside the IDE. The server side component includes EJB packaging and some simple Web servlet support for retrieving diagnostic and performance data...
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.