Showing 11 open source projects for "method"

View related business solutions
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 1

    Safe Harbor Deidentification

    Safe Harbor Deidentification for medical documents

    Phalanx - Deidentify Safe Harbor Deidentification Mode of Phalanx is an abridged pipeline of NLP annotators culminating in NER annotators which write output of text offsets. It uses the Safe Harbor deidentification method.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    A thin, role-based, single image system for scalable cluster management. oneSIS is a simple, flexible method for managing one or more clusters from a single filesystem image. It is easy to deploy, and it simplifies the task of cluster administration.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3
    netool toolkit 4.6

    netool toolkit 4.6

    MitM pentesting opensource toolkit

    ...Rootsector module allows you to automate some attacks over DNS_SPOOF + MitM (phishing - social engineering) using metasploit, apache2 and ettercap frameworks. Like the generation of payloads, shellcode, backdoors delivered using dns_spoof and MitM method to redirect a target to your phishing webpage. recent as introducted the scanner inurlbr (by cleiton)
    Downloads: 1 This Week
    Last Update:
    See Project
  • 4
    Build FW1 Cisco Netscreen PolicyFromLogs
    These three tools build Checkpoint, Cisco ASA or Netscreen policys from logfiles. They write dbedit, access-list or set address, set service and set policy commands for the traffic seen in the logs, that can be cut and pasted into the firewalls. WOOT
    Downloads: 8 This Week
    Last Update:
    See Project
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • 5
    Highly configurable Universal Access Method(UAM) server for Chillispot, CoovaChilli or WifiDog. Contains a Dynamic Walled Garden as well as a system to use PayPal or Google Checkout to purchase time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    rrd-watcher is an intelligent alerting system that detects and alerts on abnormal data found in RRD files. Alerts can be raised by using the rrdtool Holt-Winters forecasting method, or with the rrd-watcher detection algorithm.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    vuVolume is a framework for volume rendering algorithms in C++. When creating a new rendering method in vuVolume it is possible to just concentrate on the actual algorithm and let the framework take care of the more administrative tasks.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    AVD is a continuation of the swim project. The goal is to create a suitable SQL server from swim's not-installed DB, and to maintain the swim client. AVD will be used as a gBootRoot method.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    A daemon that provides a method to track generic POP3 or IMAP logins and then email (in future:also block) the user if they exceed the number of accesses per given minutes allowed.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Go from Code to Production URL in Seconds Icon
    Go from Code to Production URL in Seconds

    Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.

    Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
    Try it free
  • 10
    Non-root users construct, develop, test and run all types of distributions with Root Methods (Yard, etc.) and user-mode-linux, then finish with a Boot Method (2-disk compression, etc). Make_debian yard template creator provided for Debian users.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    A method of file compresison where the value of all the binary information in a file as one figure is divided by a number, therefore shirtening the size of the file. To decompress you multiply it by that number again.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB