Showing 20 open source projects for "method"

View related business solutions
  • Auth0 B2B Essentials: SSO, MFA, and RBAC Built In Icon
    Auth0 B2B Essentials: SSO, MFA, and RBAC Built In

    Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.

    Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
    Sign Up Free
  • Gemini 3 and 200+ AI Models on One Platform Icon
    Gemini 3 and 200+ AI Models on One Platform

    Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.

    Build generative AI apps with Vertex AI. Switch between models without switching platforms.
    Start Free
  • 1
    Salt

    Salt

    Automate the management and configuration of infrastructures at scale

    ...The document also outlines the best-effort support policy for additional operating systems. Salt Bootstrap is a shell script that detects the target platform and selects the best installation method.
    Downloads: 39 This Week
    Last Update:
    See Project
  • 2
    LLFW

    LLFW

    Professional LLF Tool for Linux

    LLFW is a tool for Linux users that performs low-level format operations on disks. Thanks to its user-friendly interface and powerful features, you can easily perform operations such as filling with zeros, writing random data or secure erase.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 3
    Simple Clipboard Logger

    Simple Clipboard Logger

    AutoSaves any text clipboard data into a single TXT file

    ...Its a fully offline python program that works in your windows tray, that lets you access the TXT file any time you need. Sadly, its worth mentioning that keyloggers that hackers use to steal data work with the same method as this program, except they hide it and send the data online, so this program may result in a false positive with your installed antivirus. You'll need to create an exception to let this program not get quarantined by accident. Source code is included with the program and this program will never send your data anywhere or record it anywhere else than that single TXT file so I assure you it is safe - you can check the source code yourself.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 4

    http-proxy-tunnel

    Create nested tunnels through HTTP proxies

    Http-proxy-tunnel creates TCP tunnels through http proxies that permit the CONNECT method. It differs from other proxy tunnelling programs in that it can tunnel through multiple proxies, and can use SSL tunnels. These abilities mean that in combination with a web server that can proxy (such as Apache) you can serve normal web pages from ports 80 and 443 and connect to the server (using ssh say) via those ports at the same time.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Powerful App Monitoring Without Surprise Bills Icon
    Powerful App Monitoring Without Surprise Bills

    AppSignal starts at $23/month with all features included. No overages, no hidden fees. 30-day free trial.

    Tired of monitoring tools that punish you for scaling? AppSignal offers transparent, predictable pricing with every feature unlocked on every plan. Track errors, monitor performance, detect anomalies, and manage logs across Ruby, Python, Node.js, and more. Trusted by developers since 2012 with free dev-to-dev support. No credit card required to start your 30-day trial.
    Try AppSignal Free
  • 5
    Simple File Organizer

    Simple File Organizer

    A GUI tool for organizing files, based on file extension type.

    1. Choose a folder to organize files in 2. Select the type of file(s) to work with The simple search method includes a set of pre-defined file types The custom search method lets you choose specific file types 3. Choose if you want to copy the files to a new folder, or move them to a new folder 4. Run
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Age and Gender Estimation

    Age and Gender Estimation

    Keras implementation of a CNN network for age and gender estimation

    ...We pose the age regression problem as a deep classification problem followed by a softmax expected value refinement and show improvements over direct regression training of CNNs. Our proposed method, Deep EXpectation (DEX) of apparent age, first detects the face in the test image and then extracts the CNN predictions from an ensemble of 20 networks on the cropped face.
    Downloads: 2 This Week
    Last Update:
    See Project
  • 7
    ENAS in PyTorch

    ENAS in PyTorch

    PyTorch implementation of "Efficient Neural Architecture Search

    ENAS in PyTorch is a PyTorch implementation of Efficient Neural Architecture Search (ENAS), a method that automates the design of neural network architectures through reinforcement learning and parameter sharing. The repository demonstrates how a controller network can explore a large search space and discover high-performing architectures while dramatically reducing the computational cost traditionally associated with neural architecture search.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Safe Harbor Deidentification

    Safe Harbor Deidentification for medical documents

    Phalanx - Deidentify Safe Harbor Deidentification Mode of Phalanx is an abridged pipeline of NLP annotators culminating in NER annotators which write output of text offsets. It uses the Safe Harbor deidentification method.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    Autologging

    Easier logging and tracing of Python functions and class methods.

    ..."my.module.ClassName"). "autologging.traced" decorates a class to provide automatic CALL/RETURN tracing for all class, static, and instance methods, as well as the special __init__ method (by default) "autologging.TRACE" is a custom log level (lower than logging.DEBUG) that is registered with the Python logging module when autologging is imported
    Downloads: 0 This Week
    Last Update:
    See Project
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • 10
    Manifest Maker

    Manifest Maker

    Python app to create plain text manifest from files

    Manifest Maker is a graphical Python application which takes a file or group of files and creates a plain text manifest list of each item. The manifest includes the file name (including directory structure) as well as a checksum of the file. (No longer maintained)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    netool toolkit 4.6

    netool toolkit 4.6

    MitM pentesting opensource toolkit

    ...Rootsector module allows you to automate some attacks over DNS_SPOOF + MitM (phishing - social engineering) using metasploit, apache2 and ettercap frameworks. Like the generation of payloads, shellcode, backdoors delivered using dns_spoof and MitM method to redirect a target to your phishing webpage. recent as introducted the scanner inurlbr (by cleiton)
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    MultiPlink

    MultiPlink

    [UPDATE 28-10-2015] FINAL MULTIPLINK SSH LIFETIME v2.0 UP-5 "FAREWELL"

    Download Link Utama: http://sourceforge.net/projects/multiplink/files/Final_MultiPlink_SSHLIFETIME_2.0_UP-5_FAREWELL.rar/download Jika di Halaman Download, Link belum tersedia, klik link alternatif : https://www.dropbox.com/s/znptxp2gxhihpax/Final_MultiPlink_SSHLIFETIME_2.0_UP-5_FAREWELL.rar?dl=0 Lalu Download & Install juga Minor...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    GASiC

    Genome Abundance Similarity Correction

    ...However, the majority of approaches either quantify at low resolution (e.g. at phylum level) or have severe problems discerning highly similar species. Yet, accurate quantification on species level is desirable in applications such as metagenomic diagnostics or community comparison. GASiC is a method to correct read alignment results for the ambiguities imposed by similarities of genomes. It has superior performance over existing methods. You can find the accompanying paper here: http://nar.oxfordjournals.org/content/41/1/e10.short Thanks to the great work of the SeqAn team, you can now use GASiC as a Knime workflow: https://github.com/seqan/knime_seqan_workflows/tree/master/metagenomics_gasic_workflow
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    GSI Student ToolBox
    GSI student toolbox is a software package made for teaching purposes. It allows you to perform seismic inversion using global sthocastic inversion method made within CERENA/CMRP. NOTE: you can perform the same operations done with GSI Student Toolbox with our newest software GEOMS2. You can download the beta release here: https://sourceforge.net/projects/geoms2/
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    Lioness (Languages Interop Framework)
    Framework for making Windows applications that are one .exe file in AutoHotKey_L,C++,C#, VB.NET,Java,Groovy,Common Lisp,Nemerle,Ruby,Python,PHP,Lua,Tcl,Perl,Jint,S#,WSH VBScript,HTML/JavaScript/CSS,COM, PowerShell without compiling . For .NET 4.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    A tool for autonomous and virtual topical data integration using the focused web-harvesting method.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17
    This is the official homepage of PyURLSnooper, a program written to help users locate the urls of audio and video files so that they can be recorded. This is a OS independent equivalent of URL Snooper from http://www.donationcoder.com/ (similar to https://sourceforge.net/projects/mediasniffer/). Can be used in combination with RTMPDump (http://rtmpdump.mplayerhq.hu/) in order to capture streams.
    Leader badge
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    ...It copies every file on a computer and figures out how to recreate it from scratch. It is primarily network oriented but is also flexible enough to boot from any possible method.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Qualm is a graphical tool for persistent resource management. While Qualm is initially aimed at providing an entirely new method of doing disk quota management, qualm can be used for managing any persistent finite resource.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    6bed4

    zeroconfig IPv6 tunnel

    ...Such IPv6 implementation could be arranged on the fly with a tunnel mechanism that does not rely on router co-operation or manual configuration. This specification details such a method of embedding IPv6 into UDP and IPv4. It employs embedded Router Solicitation to configure the tunnel's public IPv6 address, and Neighbor Discovery to try to find the remote peer over more efficient IPv4 routes.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB