Other Useful Business Software
Grafana: The open and composable observability platform Icon
Grafana: The open and composable observability platform

Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.

Grafana is the open source analytics & monitoring solution for every database.
Learn More
Build Securely on AWS with Proven Frameworks Icon
Build Securely on AWS with Proven Frameworks

Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Create and run cloud-based virtual machines. Icon
Create and run cloud-based virtual machines.

Secure and customizable compute service that lets you create and run virtual machines.

Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
Try for free
SIEM | API Security | Log Management Software Icon
SIEM | API Security | Log Management Software

AI-Powered Security and IT Operations Without Compromise.

Built on the Graylog Platform, Graylog Security is the industry’s best-of-breed threat detection, investigation, and response (TDIR) solution. It simplifies analysts’ day-to-day cybersecurity activities with an unmatched workflow and user experience while simultaneously providing short- and long-term budget flexibility in the form of low total cost of ownership (TCO) that CISOs covet. With Graylog Security, security analysts can:
Learn More
Field Service Management Software | BlueFolder Icon
Field Service Management Software | BlueFolder

Maximize technician productivity with intuitive field service software

Track all your service data in one easy-to-use system, enabling your team to move faster and generate more revenue for your bottom line.
Learn More

Additional Details for Fuzzy sets for Ada

Operating Systems

BSD, Cygwin, Linux, MinGW/MSYS2, Windows

Intended Audience

Developers, Education, Engineering, Information Technology, Science/Research

User Interface

GTK+

Programming Language

Ada

Registered

2014-07-27

Last Updated

Categories

Artificial Intelligence, Information Analysis, Libraries

Maintainers

dmitry-kazakov

Keep Me Updated!