Showing 4 open source projects for "command line form filling"

View related business solutions
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • Innovate faster with enterprise-ready generative AI—enhanced by Gemini Icon
    Innovate faster with enterprise-ready generative AI—enhanced by Gemini

    Build, deploy, and scale machine learning (ML) models faster, with fully managed ML tools for any use case.

    Vertex AI offers everything you need to build and use generative AI—from AI solutions, to Search and Conversation, to 130+ foundation models, to a unified AI platform.
  • 1
    lottie vectors

    lottie vectors

    Create, display and process 2D vectors in a 3D window.

    ... something acting on a position with direction and magnitude. Finally you can give each position a tag to display on screen. This could be a common math symbol or greek letter, start/end signposts, or a number of the position either from the begining or after a reset. After all the information has been loaded for your dataset. Either passed over the command line, or as a text file. Lottie Vectors displays inside a figure that you can resize, rotate and turn 2D positions into a 3D picture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Acoustic Research Tool (ART)

    Acoustic Research Tool (ART)

    Acoustic Simulation Library for Frequency and Time Domain Simulations.

    ... expressions. Cylindrical and conical ducts can also be defined based on their geometry. Available models and their parameters can be enumerated and combined to form simulators for complex acoustical structures. Parameters can be specified symbolically by expressions containing other parameter values or global variables. Dependencies between parameters are resolved at run time. However, MuParserX expressions are compiled at design time. Zero-delay loops are detected and reported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    spinney
    SPINNEY provides an implementation of helicity spinors and related algorithms for the symbolical manipulation program FORM. The description of this package is published in http://arxiv.org/abs/1008.0803 .
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    A simple little program, that can convert quaternions from a exponential form to a usual form. I will argue for this method, which I find very natural and quite intuitive.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Intelligent network automation for businesses and organizations Icon
    Intelligent network automation for businesses and organizations

    Network automation for the hybrid multi-cloud era

    BackBox seamlessly integrates with network monitoring and NetOps platforms and automates configuration backups, restores, and change detection. BackBox also provides before and after config diffs for change management, and automated remediation of discovered network security issues.
  • Previous
  • You're on page 1
  • Next