Access competitive interest rates on your digital assets.
Generate interest, borrow against your crypto, and trade a range of cryptocurrencies — all in one platform.
Geographic restrictions, eligibility, and terms apply.
Get started with Nexo.
Add Two Lines of Code. Get Full APM.
AppSignal installs in minutes and auto-configures dashboards, alerts, and error tracking.
Works out of the box for Rails, Django, Express, Phoenix, and more. Monitoring exceptions and performance in no time.
Thought-holder - holds thoughts for later viewing and tracking.
Thought-holder is two projects that allow a person to track their thoughts and apply cognitive behavioral therapy (CBT) techniques to those thoughts with Thought-Tracker. It currently consists of thought-holder.exe and thought-tracker.exe (thought-holder requires thought-tracker) - the first makes a list of thoughts and helps you keep track of when they were created and the second helps take a thought and allows application of CBT techniques to it.
To use the thought-holder:
Enter...
Dot Net Nuke Genealogy Module - Build and show your family tree on a DNN CMS site. A sample site running on www.gremlinsa.co.za/Genealogy/tabid/138/Default.aspx . Also uses Google & Yahoo SEO Friendly url structure.
Handwriting Factory, formerly Quick Handwriting Analyser, is a program that manually (initially, hopefully), analyses a persons handwriting sample based upon up to 100 points, and prints out a report on the person's personality.
Namesmapper is planned as an extensible application that visualizes distribution of surnames in a map. It supports historic maps based on import of Gedcom files as well as modern maps based on phone dictionaries and population census.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.