Object storage is clearly the simplest, most flexible, and most scalable way to store tons of unstructured content. The Scality S3 Server enables developers and businesses to take advantage of this simplicity, for free. Whether you’re programming in Go or Java, or whether you’re using existing applications for personal or shared data management, the Scality S3 Server is a great starting point.Sponsored Listing
OSI-Approved Open Source (13)
- GNU General Public License version 2.0 (7)
- GNU Library or Lesser General Public License version 2.0 (3)
- Artistic License (2)
- BSD License (2)
- MIT License (2)
- Academic Free License (1)
- Common Development and Distribution License (1)
- Common Public License 1.0 (1)
- Computer Associates Trusted Open Source License 1.1 (1)
- Educational Community License, Version 2.0 (1)
- GNU General Public License version 3.0 (1)
- Other License (2)
- Public Domain (2)
- Windows (13)
- Grouping and Descriptive Categories (12)
- Linux (9)
- Mac (8)
- Modern (8)
- BSD (6)
- Artificial Intelligence
- Medical Science Apps.
- Human Machine Interfaces
- Interface Engine/Protocol Translator
Precise Calculator has arbitrary precision and can calculate with complex numbers, fractions, vectors and matrices. Has more than 150 mathematical functions and statistical functions and is programmable (if, goto, print, return, for).100 weekly downloads
Common Hardware Recovery Solutions by Ukrainian-Russian network from http://hardw.net/forum1 weekly downloads
CMAKE build enviroment for LPC2000 and LPC17xx Cortex MCUs4 weekly downloads
Simplify teamwork and stay in control of your communications with MegaPath One. Unified communications makes staying in touch with associates easy and efficient. See when others are available. Initiate a chat. Host a voice or video conference from any device, and invite guests to join via web browser. Handle matters quickly from your always-on virtual collaboration space with presence, instant messaging, video conferencing and screen sharing.Sponsored Listing
OCR c++ library of computer optical recognition methods. In library: contour recognition; contour vectorisation; matrix letters feature recognition; web based GUI; assembler core on SS3 instruction; xml support; detect page rotation and segmentation;
The future of information technology will be based on controlling the flow of natural light. This project is an attempt to establish the code (or software) that will enable this to happen. It involves rewriting an OS from the ground up.
POSIX API for Win2K-XP. Mainly implemented in the driver. Included: write-on-copy fork, threads, mutexes, spins, condvars, rwlocks, signals ... Signals/cancelation interrupt all waitable syscalls, NT syscalls are automaticaly restarted.
Hardware-optimised library for Area correlation algorithm
A Interactive Network VideoGame
There's no event quite like OSCON—the best place on Earth to sharpen your skills and discover new techniques, making you better at what you do and igniting your love of all things digital. You'll find everything open source: languages, communities, best practices, products and services. Join us May 8-11 in Austin, TX, and let OSCON ignite your love of all things digital!Sponsored Listing
OptiHeart is a Microchip PIC based hearbeat monitoring device. It displays the current heartbeat to the patient and checks if the current heartbeat is in the optimal range (set by a doctor). Complete hardware/software portable solution.
Qualife is the life emulation engine. Engine is based on catastrophe theory and enhanced analythis of video, audio and collision input. Includes human AI, animal AI, anomalous AI. AI can work in standalone, team and slave mode.
SPprotect (Scar Podarok protection) is a CD protection library, based on CD filesystem protection via original mechanism of our mind 8)
Universal CNC (Computer Numerical Control) system with accompanying communication and graphics libraries
The book shows you how architecting a modern security visibility infrastructure can help your business adapt to new threats, lengthen the usefulness of your current security investments, and optimize uptime and availability. See the entire threat landscape, understand security visibility basics, support both inline and out-of-band security systems, explore security visibility use cases and ask the right questions about visibility.Sponsored Listing