Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.
Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
Sign up for free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
A collection of advanced open source command-line tools
Percona Toolkit is a collection of battle-tested command-line tools for MySQL and MariaDB that help diagnose performance, verify integrity, and perform online maintenance safely. Utilities such as pt-query-digest analyze slow logs and packet captures to surface hotspots and regressions, while pt-online-schema-change applies ALTERs with minimal blocking by copying and swapping tables.
gputils is a collection of tools for Microchip PIC microcontrollers. Its goal is to be fully compatible with Microchip's tools, MPASM, MPLINK, and MPLIB.
The Murder Accountability Project's Serial Killer Algorithm
A much improved Linux/Perl implementation of the Murder Accountability Project's Serial Killer Algorithm. This module was tested with the "SHR76_19.csv" available from www.murderdata.org/p/data-docs.html. This module provides functions to prepare the data, upload to a database and view the identified clusters.
Download SHR76_19.csv (23/03/2021) - https://www.dropbox.com/s/ye37woe6et05qgs/SHR76_19.csv.zip?dl=1
For information on this algorithm and the Murder Accountability Project please visit: www.murderdata.org.
...
the package chewingum contains two main programs:
- base62
- chew
They have been implemented in perl.
Base62 has been coded in c++ too.
chew has been written to shorten long decimal integer numbers into base62 strings.
It's not a mere base conversion, because it doesn't use arithmetic inside its logic.
In this way it can convert very long numbers into strings quickly,
without overflows.
For example if I want to share an id using an url, this will make the url shorter.
the...
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Linode Longview is a system-level statistics collection and graphing service powered by an open-source agent that can be installed on any Linux system. It collects system statistics and sends them to Linode, where the data is stored and presented in meaningful ways.
Scripting tool for automatize and managing complex NGS analysis
Handling with NGS tool configuration files is a real challenge for modern biologists and biotechnologist. To increase productivity, specificity and enhance the data processing, this tool provides a collection of commands already structured, leading the user in building the correct pipeline for the data he has to analyse.
Pipeline Builder is a scripting tool for managing complex NGS analysis pipelines. It helps the user in composing NGS tool commands and composing his own analysis pipeline. ...
OSIOSS (Open Source Integrated Observing System Software) is a collection of code which can be used for geospatial observing systems merging datacollection, management and products solutions with ocean observing systems (OOS) as an initial focus.
NAC is a collection of tools for cryptography. The goal is to provide simple-to-use crypto tools (like an OTP, String and number generator, public key algorithm...) you can use under Linux, Windows...
A collection of implementations of the Lovins stemmer as described in "Development of a Stemming Algorithm" by Julie Beth Lovins (published in "Mechanical translation and computational linguistics", 11:22-31, 1968).
Advanced built-in security helps IT prevent breaches before they happen
Defend against security incidents with Chrome Enterprise. Create customizable controls, manage extensions and set proactive alerts to keep your data and employees protected without slowing down productivity.