Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Start Free
Gemini 3 and 200+ AI Models on One Platform
Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build generative AI apps with Vertex AI. Switch between models without switching platforms.
Sample code for Ocean Optics OmniDriver spectrometer devicedriver
Sample code demonstrating how to use OmniDriver to drive Ocean Optics full range of spectrometers from C, C++, C#, Java, LabVIEW, Delphi, MATLAB and more.
ztex is a Firmware Kit with a corresponding Driver API for EZ-USB based hardware. The Firmware is written in C and assembled using a powerful macro processor. The Driver API allows the development of platform-independent device drivers.
Mind the re-programmable hardware, even CPU for most mobile devices. Flushable devices. Flushable CPU, modem, camera - any kind of EMPTY NAND device, creating a new one by the engineering forth and back and forward again. We recreate the world
X10 device drivers for Linux creating a /dev device for each X10 unit in the house. This allows command line, script, and program access to the X10 network.This driver currently supports the PowerLinc Serial, PowerLinc USB, and CM11A.
rtusd is a foundation set of real time enabled User Space Devices/Drivers designed to link to HRT high resolution Timer controlled POSIX threads and link re-factored Linux hdw drivers for 2.6.18+. rtusd propogates Linux RT to user space generically.
OS independent RS232 remote control. Java-based server (console), easy adjustable HTML GUI, local/internet use, incl. devicedriver API and drivers (e.g. EIKI LC-XM1/SM1/VM1!!)
...With EaseFilter DRM, you can:
Restrict access to authorized users, devices, and applications only.
Block forwarding, uploading to unauthorized cloud services, or syncing to personal drives.
Apply time-based access (expiration dates) and geo/device restrictions.
Maintain tamper-evident audit trails for compliance and forensics.