Showing 4 open source projects for "processing"

View related business solutions
  • Try Google Cloud Risk-Free With $300 in Credit Icon
    Try Google Cloud Risk-Free With $300 in Credit

    No hidden charges. No surprise bills. Cancel anytime.

    Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
    Start Free
  • Custom VMs From 1 to 96 vCPUs With 99.95% Uptime Icon
    Custom VMs From 1 to 96 vCPUs With 99.95% Uptime

    General-purpose, compute-optimized, or GPU/TPU-accelerated. Built to your exact specs.

    Live migration and automatic failover keep workloads online through maintenance. One free e2-micro VM every month.
    Try Free
  • 1
    graphql-upload

    graphql-upload

    Middleware and an Upload scalar to add support for GraphQL multipart

    ...Clients implementing the GraphQL multipart request spec upload files as Upload scalar query or mutation variables. Their resolver values are promises that resolve file upload details for processing and storage. Files are typically streamed into cloud storage but may also be stored in the filesystem. Use the middleware graphqlUploadKoa or graphqlUploadExpress just before GraphQL middleware. Alternatively, use the function processRequest to create custom middleware. The process must have both read and write access to the directory identified by os.tmpdir(). ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Ediacaran Application

    Ediacaran Application

    Applications with modular architecture

    ...The modular structure of the Ediacaran application allows fine-grained control over how each module accesses data, external connections, and execution resources. For example, the storage module can enforce strict access rules so that only authorized modules (like processing) can read or write data, while external-facing modules (like ingestion or visualization) have limited permissions. This reduces the attack surface, helps prevent unauthorized access, and enables better enforcement of security policies such as authentication, authorization, and data isolation.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Proxy yxorP

    Proxy yxorP

    Proxy 🦄 .yxorP [v2.1] Plug & Play Stateful SAAS(y), Multi-tenancy

    yxorP is a plug-and-play, flat-file application that does not need Composer, PHP CURL, or databases; these are all optional additions that are fully supported. yxorP is intended to act as a proxy that can edit or update the content of multiple websites using a PHAR (PHP archive) binary version of Guzzle, and managed via a user-friendly Cockpit backend (GUI). The incoming request hostname is used to fetch site-specific requirements from the backend, the target website is then retrieved and...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Koa2 RESTful API

    Koa2 RESTful API

    RESTful API Server

    ...This scaffolding only installs some necessary plug-ins that do not conflict with Koa2 to build a RESTful API Server, with instructions for each plug-in. Syntax checking with ESlint. Therefore, the scaffolding mainly provides RESTful API, so the front-end static resource processing is not considered for the time being, and only the basic method of static resource access is provided to facilitate access to resources such as pictures uploaded by users to the server. The basic directory structure is consistent with vue-cli and can be used with front-end frameworks such as React, AngularJS, and Vue.js.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB