Showing 10 open source projects for "logical"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • eProcurement Software Icon
    eProcurement Software

    Enterprises and companies seeking a solution to manage all their procurement operations and processes

    eBuyerAssist by Eyvo is a cloud-based procurement solution designed for businesses of all sizes and industries. Fully modular and scalable, it streamlines the entire procurement lifecycle—from requisition to fulfillment. The platform includes powerful tools for strategic sourcing, supplier management, warehouse operations, and contract oversight. Additional modules cover purchase orders, approval workflows, inventory and asset management, customer orders, budget control, cost accounting, invoice matching, vendor credit checks, and risk analysis. eBuyerAssist centralizes all procurement functions into a single, easy-to-use system—improving visibility, control, and efficiency across your organization. Whether you're aiming to reduce costs, enhance compliance, or align procurement with broader business goals, eBuyerAssist helps you get there faster, smarter, and with measurable results.
    Learn More
  • 1
    LiquidHaskell

    LiquidHaskell

    Liquid Types For Haskell

    This is the development site of the LiquidHaskell formal verification tool. If you're a LiquidHaskell user (or just curious), you probably want to go to the documentation website instead. LiquidHaskell (LH) refines Haskell's types with logical predicates that let you enforce important properties at compile time. LH warns you that head is not total as it is missing the case for [] and checks that it is total on NonEmpty lists. The input contract propagates to uses of head which are verified by ensuring the arguments are NonEmpty. LH lets you avoid off-by-one errors that can lead to crashes or buffer overflows. ...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    kcp Kubernetes

    kcp Kubernetes

    Kubernetes-like control planes for form-factors

    kcp can be a building block for SaaS service providers who need a massively multi-tenant platform to offer services to a large number of fully isolated tenants using Kubernetes-native APIs. The goal is to be useful to cloud providers as well as enterprise IT departments offering APIs within their company. kcp takes full advantage of Kubernetes API conventions, the glue that binds the cloud-native technology ecosystem together and imbues Kubernetes popular end-user experience, but kcp has...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Shield GraphQL

    Shield GraphQL

    A GraphQL tool to ease the creation of permission layer

    ...Implement your server permissions in a clear and deterministic way and let it guard access to your schema. Shield lets you create a handful of rules and compose them into meaningful structures using logical operators. To prevent recalculation of rules, every rule caches its result based on selected caching mechanism and speeds up query execution. Shield generates a type-map from your schema to make sure you have assigned your rules to the right places.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    uBlock

    uBlock

    uBlock: a fast, lightweight, and lean blocker for Chrome, Firefox

    ...Opera shares Chrome's underlying engine, so you can install uBlock simply by grabbing the latest release for Chrome.To benefit from uBlock's higher efficiency, it's advised that you don't use other blockers at the same time (such as AdBlock or Adblock Plus). uBlock will do as well or better than most popular ad blockers. It's important to note that blocking ads is not theft. Don't fall for this creepy idea. The ultimate logical consequence of blocking = theft is the criminalisation of the inalienable right to privacy.
    Downloads: 24 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 5
    Quick Hash GUI

    Quick Hash GUI

    Linux, Windows and Apple Mac File Hashing GUI Tool

    This project has moved to www.quickhash-gui.org as of 2016-12-04. I kept v2.6.9.2 and below hosted here since Dec 16 but too many people were ignoring the fact that no updates were being posted here. For the latest QuickHash v2.8.4 release (Aug 28th 2017), go to www.quickhash-gui.org, and note that as of 29/12/16 a Debian package is also available
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6

    Iris Recognition System

    Iris Recognition System Matlab source code

    ...It has a wide range of applications, in government programs such as national ID cards, use in visas and visa processing, and in the war against terrorism, as well as having personal applications in areas such as logical and physical access control. Iris recognition is the most accurate personal identification biometric and it is this that accounts for its use in identity management in government departments requiring high security. Index Terms: Matlab, source, code, iris, recognition, one to one, one to many, verification, identification, matching.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    A Very Simple Captcha

    A Very Simple Captcha

    This Plugin provides very simple and powerful captcha for your blog

    This Plugin provides very simple and powerful captcha for your blog with wide variety of logical methods and models. By displaying different logical captcha with random manner may provide high level of security. Users can select wide variety of methods to display the captcha 1. Sorting in increasing or decreasing order 2. Entering biggest or smallest number 3. Selecting Am or Am Not Spammer using combo box 4. Entering the alphabets 5.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Stegno

    This project is created for providing basic stegnography concept.

    ...RUN Decryptor.CLASS (WITH APPROPRIATE JAVA ENV.) 2. PROVIDE APPROPRIATE PARAMETERS. • file_name : (NAME OF FILE i.e. output_file_name in ENCRYPTION process) • logical_file_name : (NAME OF LOGICAL FILE i.e. target_file_name in ENCRYPTION process, file extension matters not name) e.g. java hidden.mp3 hideme.mp3 [output_file_name] [target_file_name]
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    ModRWLBF stands for ModRW Logical Brute Force. It's a tool designed to help penetration testers identify rewrite rules used by webservers using logical methods as well as pure bruteforce.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Desktop and Mobile Device Management Software Icon
    Desktop and Mobile Device Management Software

    It's a modern take on desktop management that can be scaled as per organizational needs.

    Desktop Central is a unified endpoint management (UEM) solution that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.
    Learn More
  • 10
    Logical Security is a suite of programs that enhance one's security. Currently, the following functions have been implemented: hashing,encryption,memory dumping,secure file deletion.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next