11 programs for "command line form filling" with 2 filters applied:

  • Red Hat Enterprise Linux on Microsoft Azure Icon
    Red Hat Enterprise Linux on Microsoft Azure

    Deploy Red Hat Enterprise Linux on Microsoft Azure for a secure, reliable, and scalable cloud environment, fully integrated with Microsoft services.

    Red Hat Enterprise Linux (RHEL) on Microsoft Azure provides a secure, reliable, and flexible foundation for your cloud infrastructure. Red Hat Enterprise Linux on Microsoft Azure is ideal for enterprises seeking to enhance their cloud environment with seamless integration, consistent performance, and comprehensive support.
  • Achieve perfect load balancing with a flexible Open Source Load Balancer Icon
    Achieve perfect load balancing with a flexible Open Source Load Balancer

    Take advantage of Open Source Load Balancer to elevate your business security and IT infrastructure with a custom ADC Solution.

    Boost application security and continuity with SKUDONET ADC, our Open Source Load Balancer, that maximizes IT infrastructure flexibility. Additionally, save up to $470 K per incident with AI and SKUDONET solutions, further enhancing your organization’s risk management and cost-efficiency strategies.
  • 1
    MOSSCO

    MOSSCO

    Modular System for Shelves and Coasts

    ...! ------------------------- Better, read the full documentation online http://www.mossco.de/doc or make it yourself make doc acroread doc/mossco_documentation.pdf ---------------------- Why MOSSCO? MOSSCO, the "Modular System for Shelves and Coasts" is a framework for coupling processes or domains that are originally developed in standalone numerical models. The software MOSSCO implements this infrastructure in the form of a library of components and couplers, and of example coupled application.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Time Ephemerides

    Calculate time ephemerides in convenient form

    Project to calculate and distribute the general relativistic corrections to clock rates for the surfaces of various solar system bodies. These corrections are also known as time ephemerides.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 3
    lottie vectors

    lottie vectors

    Create, display and process 2D vectors in a 3D window.

    ... something acting on a position with direction and magnitude. Finally you can give each position a tag to display on screen. This could be a common math symbol or greek letter, start/end signposts, or a number of the position either from the begining or after a reset. After all the information has been loaded for your dataset. Either passed over the command line, or as a text file. Lottie Vectors displays inside a figure that you can resize, rotate and turn 2D positions into a 3D picture.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Acoustic Research Tool (ART)

    Acoustic Research Tool (ART)

    Acoustic Simulation Library for Frequency and Time Domain Simulations.

    ... expressions. Cylindrical and conical ducts can also be defined based on their geometry. Available models and their parameters can be enumerated and combined to form simulators for complex acoustical structures. Parameters can be specified symbolically by expressions containing other parameter values or global variables. Dependencies between parameters are resolved at run time. However, MuParserX expressions are compiled at design time. Zero-delay loops are detected and reported.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • 5
    The program evaluates ordinal expressions and relations. displaying the normal form output in plain text and/or TeX format. It supports notations for ordinals through and somewhat beyond those definable by the Veblen function.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 6
    spinney
    SPINNEY provides an implementation of helicity spinors and related algorithms for the symbolical manipulation program FORM. The description of this package is published in http://arxiv.org/abs/1008.0803 .
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Genie
    Genie is a highly sophisticated cognitive child-machine. Genie at its core is an artificial intelligence project, focusing on creating a new form of life.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    This is a neat little tool to visualize binary data in a graphical form. It's really interesting to look at different types of files.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    Design and develop Recommendation and Adaptive Prediction Engines to address eCommerce opportunities. Build a portfolio of engines by creating and porting algorithms from multiple disciplines to a usable form. Try to solve NetFlix and other challenges.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cloudflare secures and ensures the reliability of your external-facing resources such as websites, APIs, and applications. Icon
    It protects your internal resources such as behind-the-firewall applications, teams, and devices.
  • 10
    Mandel is a command-line program for generating Mandelbrot set fractals - support for Julia sets is coming soon. Output is in the form of 8 bit greyscale Device Independent Bitmaps, which can be readily viewed with many common graphics programs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    Supertagger

    Software for assigning supertags.

    Supertagging is a process of statistical lexical disambiguation, preprocessing step to parsing, which assigns LTAG tree categories to the lexical items present in the input sentence. Thus, if the input sentence is in the form of a dependency tree, the task of the supertagger is to assign the most probable TAG family to each node and edge in the dependency tree.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next