4 projects for "for java" with 2 filters applied:

  • Keep company data safe with Chrome Enterprise Icon
    Keep company data safe with Chrome Enterprise

    Protect your business with AI policies and data loss prevention in the browser

    Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
    Download Chrome
  • Turn speech into text using Google AI Icon
    Turn speech into text using Google AI

    Accurately convert voice to text in over 125 languages and variants by applying powerful machine learning models with an easy-to-use API.

    New customers get $300 in free credits to spend on Speech-to-Text. All customers get 60 minutes for transcribing and analyzing audio free per month, not charged against your credits.
    Try for free
  • 1
    Tpl makes it easy to serialize your C data using just a handful of API functions. The data is stored in its native binary form for maximum efficiency. C, Perl and XML supported. Data is portable across CPU types and OS's from Unix to Mac to Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    EDAS2 is a web-based environmental quality data management and decision support framework
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Jawal is a Java news reader to be used on any OS running Java 1.5 or higher. Jawal is made of 2 parts: * the core part made of classes designed to support NNTP exchanges with server(s). This part can be reused in other projects since API and documentatio
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    This project is focused on creating an ajax web application for interacting with an uddi registry.
    Downloads: 0 This Week
    Last Update:
    See Project
  • ThreatLocker Cybersecurity Software Icon
    ThreatLocker Cybersecurity Software

    Giving you complete control to help you manage your applications and better protect your endpoints.

    The Zero Trust security solution that offers a unified approach to protecting users, devices, and networks against the exploitation of zero day vulnerabilities.
    Learn More
  • Previous
  • You're on page 1
  • Next