Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity.
Freshservice is an intuitive, AI-powered platform that helps IT, operations, and business teams deliver exceptional service without the usual complexity. Automate repetitive tasks, resolve issues faster, and provide seamless support across the organization. From managing incidents and assets to driving smarter decisions, Freshservice makes it easy to stay efficient and scale with confidence.
Try it Free
Full-stack observability with actually useful AI | Grafana Cloud
Our generous forever free tier includes the full platform, including the AI Assistant, for 3 users with 10k metrics, 50GB logs, and 50GB traces.
Built on open standards like Prometheus and OpenTelemetry, Grafana Cloud includes Kubernetes Monitoring, Application Observability, Incident Response, plus the AI-powered Grafana Assistant. Get started with our generous free tier today.
It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.
IslandEv distributes a GeneticAlgorithm (like <a href="/projects/jaga">JaGa</a>) across a network (see <a href="/projects/distrit">DistrIT</a>) using an island based coevolutionary model in which neighbouring islands swap migrating individuals every
Disk Optimizer selects files to be placed on any disk medium that will maximize the space used. It is very efficient in finding an optimum file set since it uses a GeneticAlgorithm instead of brute force.
An ASCII MMORPG / World Simulation / Genetic Programming Project
This project was previously oriented towards creating an AI based Operating System.
However new visitors should refer to www.theasciiproject.com for information about what this project has developed into.
A java library to demonstrate an algorithm to coordinate First Order multi-party interactions. This algorithm could be used to implement concepts in distributed coordinated computing
including the Multi-way Rendezvous statement.
A similar to Tripwire, file system integrity checking tool but develop in java and cross platform.
This tools checking and source control using check sum algorithm like MD5, SHA and CRC.
GP@home is a new group/project dedicated to fully utilizing the combined concepts of genetic programming and distributed computing to improve the quality of life for all human beings. Nothing is impossible working together.
A human-readable ISC-Licensed implementation of the LZO1X algorithm.
LZO is a compression library which is widely used around the world. The main problem with LZO is that it is absolutely not human readable.
People have done crazy stuff to get LZO to run in their language. Usually it implies inline assembly or trying to execute data which actually contains machine code. This is sick. Whoever is responsible for this sorry situation ought to be ashamed.
So I'm going to deobfuscate LZO and provide a ISC implementation of this algorithm in Python and C. In...
Deeplearning based model for home security.. attach a webcam run this
...The software works by capturing the image using inbuilt/USB powered webcam, comparing the subsequent images for pixel differences and piping the image through deep learning algorithm. Once the object of interest(human in present case) is detected, the software attempts to send email with image as an attachment to the designated email ids. The feature is currently restricted to dummy email id, if you want to customize it to yours, pl. send me an email with request. ...
Its a software which can be used to simulate and emulate the mobility management in the wireless network, this implements the mobility management algorithm,
it uses the Blue tooth as a communication media between a wireless terminal and
Transparent file encryption performs real-time I/O encryption and decryption of the files in any block data with 16 bytes. The encryption uses a 256 bits symmetric key to encrypt or decrypt the data with AES encryption algorithm. Auto file encryption protects data "at rest", meaning the transparent data and files encryption. It provides the ability to comply with policies which can be applied by users, processes and file type. This allows only authorized users and processes to access the...