Showing 4 open source projects for "size"

View related business solutions
  • Get Advanced Threat Protection for Your Azure Workloads Icon
    Get Advanced Threat Protection for Your Azure Workloads

    FortiGate NGFW on Azure Enables You to Protect Your Workloads Beyond Basic Azure Security Services

    FortiGate NGFW identifies and stops advanced threats with powerful application control, malware protection, web filtering, antivirus, and IPS technology. As the attack surface expands, FortiGate provides integrated and automated protection against emerging and sophisticated threats while securing hybrid or multi-cloud environments. Deploy today in Azure Marketplace.
  • JobNimbus Construction Software Icon
    JobNimbus Construction Software

    For Roofers, Remodelers, Contractors, Home Service Industry

    Track leads, jobs, and tasks from one easy to use software. You can access your information wherever you are, get everyone on the same page, and grow your business.
  • 1
    pty

    pty

    PTY interface for Go

    Pty is a Go package for using unix pseudo-terminals. Note that the examples are for demonstration purpose only, to showcase how to use the library. They are not meant to be used in any kind of production environment. Start assigns a pseudo-terminal tty os.File to c.Stdin, c.Stdout, and c.Stderr, calls c.Start, and returns the File of the tty's corresponding pty. InheritSize applies the terminal size of pty to tty. This should be run in a signal handler for syscall.SIGWINCH to automatically...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 2
    TinyGo

    TinyGo

    Go compiler for small place

    TinyGo brings the Go programming language to embedded systems and to the modern web by creating a new compiler based on LLVM. You can compile and run TinyGo programs on over 60 different microcontroller boards such as the BBC micro:bit and the Arduino Uno. TinyGo can also produce WebAssembly (WASM) code which is very compact in size. You can compile programs for web browsers, as well as for server and edge computing environments that support the WebAssembly System Interface (WASI) family...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    dive

    dive

    A tool for exploring each layer in a docker image

    A tool for exploring a docker image, layer contents, and discovering ways to shrink the size of your Docker/OCI image. As you select a layer on the left, you are shown the contents of that layer combined with all previous layers on the right. Also, you can fully explore the file tree with the arrow keys. Files that have changed, been modified, added, or removed are indicated in the file tree. This can be adjusted to show changes for a specific layer, or aggregated changes up to this layer...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    DevDash

    DevDash

    Highly Configurable Terminal Dashboard for Developers and Creators

    DevDash is a highly configurable terminal dashboard for developers and creators. It will allow you to choose and display the most up-to-date metrics you need, at one place. The data will be automatically refreshed while you’re doing other productive tasks. Get started and create your first dashboard, or see DevDash in action with many examples (including their configuration). Change the display of your widgets (colors or size). Understand how to use time period for many widgets in DevDash...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Cyber Risk Assessment and Management Platform Icon
    Cyber Risk Assessment and Management Platform

    ConnectWise Identify is a powerful cybersecurity risk assessment platform offering strategic cybersecurity assessments and recommendations.

    When it comes to cybersecurity, what your clients don’t know can really hurt them. And believe it or not, keep them safe starts with asking questions. With ConnectWise Identify Assessment, get access to risk assessment backed by the NIST Cybersecurity Framework to uncover risks across your client’s entire business, not just their networks. With a clearly defined, easy-to-read risk report in hand, you can start having meaningful security conversations that can get you on the path of keeping your clients protected from every angle. Choose from two assessment levels to cover every client’s need, from the Essentials to cover the basics to our Comprehensive Assessment to dive deeper to uncover additional risks. Our intuitive heat map shows you your client’s overall risk level and priority to address risks based on probability and financial impact. Each report includes remediation recommendations to help you create a revenue-generating action plan.
  • Previous
  • You're on page 1
  • Next