AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Try it Free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
IceNotes ME for Mobile Devices is an extremly usefull ;-) JAVA ME (J2ME) application to store all your important (text)notes on your mobile phone using "Twofish" encryption. Your notes are organized by assigning your own custom tags to your notes.
DiscriAlign implements a novel algorithm that aligns a set of biological interaction networks.It identifies both functionally conserved and dissimilar regions.
Distributed Ant Robotics is divided into two parts. First is the simulation of “ant colony”. Second part is the algorithm application. Where you can use algorithms for ant behavior.
This is an implementation of the Drop Dead loot management system used by the Elders kinship in the Lord of the Rings online. The algorithm is based on the Suicide Kings system.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
iScore measures the interestingness of news articles in a limited user environment. It is an online learning algorithm that combines a large set of disparate features to classify documents. To download the source code, please use subversion.
TBLTools is a set of GATE processing resources that implements the Fast Transformation Based Learning Algorithm. You can train it to learn rules for NLP tasks such as Named Entity Recognition and Shallow parsing.
Semeir is a Encryptionalgorithm, Capable of block encryption. It is written in pure C. It is platform independent, and is promising for Embedded systems. Intended as an alternate, yet secure data encryption cipher.
Turn Your Content into Interactive Magic - For Free
From Canva to Slides, Desmos to YouTube, Lumio works with the tech tools you are already using.
Transform anything you share into an engaging digital experience - for free. Instantly convert your PDFs, slides, and files into dynamic, interactive sessions with built-in collaboration tools, activities, and real-time assessment. From teaching to training to team building, make every presentation unforgettable. Used by millions for education, business, and professional development.
This project is aimed at extracting keywords from documents either as files or on the Internet. It applies sophisticated keyword ranking algorithm to extract most relevant keywords for a document and has also the capability of finding similar document in
This program is a replica of SafeSex by Nullsoft. Written from scratch on the .NET Framework 3.5.
It allows you to keep useful notes in a safe manner, as it allows for encryption using the world renowned AES encryptionalgorithm.
This is an algorithm to codify Spanish words to an equivalent phonetic code. That intends to be a substitute of Soundex algorithm that is not practical to use in Spanish. It is very useful for search engines based on text information.
An encryption/decryption engine which can encrypt any file(text, pdf , doc, rtf , gpg , mp3 , mp4 etc..) or any data on your PC such that only you with the valid password can decrypt it.Also it will compress the file while encrypting it.
This program serves to keep track of different types of accounts (technically an infinity number of different types). Currently only bank and equity accounts are supported. Data is saved on the user's computer and encrypted using the DES-algorithm.
The Security Annotation Framework (SAF) is an instance-level access control framework and field-level encryption framework driven by Java 5 annotations.
A disk based production quality RTree based upon Guttmans quadratic split algorithm having following features:
Buffering with dirty write,
Index joins,
Tree Seeding,
Window and NN queries,
Runtime STR Packing capability,
Completely Thread safe.
HelloWorld is a decentralized social network based on OpenID, P2P and different JAVAencryption technologies. It will offer all the fundamental functionalities of a social network platform respecting the right of informational self-determination.
mp3stegz is an application that apply steganographic (steganography) algorithm in mp3 files. mp3stegz will maintain original mp3 file's size and sound quality. The hidden message is compressed(zlib) and encrypted(Rijndael).
NetBeans, pure Java. The Cryppie can protect your files by encrypting its content, possibility to compress files before encryption. It's destination for keep information in safe on your flash drive or another storage.
The project will develop an in – memory object cache utilizing the LRU (least-recently-used) algorithm. The cache will store the objects that are most accessed within a fixed size memory pool. Thus system is keep statistics and calculates tradeoffs.
USA CRYPT is a smart, powerful and easy-to-use file-encryption tool that works with Advanced Encryption Standard (AES) algorithm - 256bit key. Operation mode: OFB
MC2 Java Multicast Chat is a serverless p2p chat based on multicast datagrams. Very useful if you want to quickly have a chat session in a Lan without having to do annoying setups. Supports file sharing / sending,multiple channel chat and data encryption
Processes boolean functions which can be provided either as a list of 0s and 1s or which can be provided as a formula in first-order logic (using disjunctive or conjunctive normal forms). Internally the Quine McCluskey algorithm is used.
Primarily applied in experimental psychology, where it is used to create experiment schedules. It even can be applied to other planning-activities that have to met boundary constraints. Rando uses a genetic-algorithm to construct a fulfilled schedule.