You Might Also Like
The Secure Workspace for Remote Work Icon
The Secure Workspace for Remote Work

Venn isolates and protects work from any personal use on the same computer, whether BYO or company issued.

Venn is a secure workspace for remote work that isolates and protects work from any personal use on the same computer. Work lives in a secure local enclave that is company controlled, where all data is encrypted and access is managed. Within the enclave – visually indicated by the Blue Border around these applications – business activity is walled off from anything that happens on the personal side. As a result, work and personal uses can now safely coexist on the same computer.
Fully managed relational database service for MySQL, PostgreSQL, and SQL Server Icon
Fully managed relational database service for MySQL, PostgreSQL, and SQL Server

Focus on your application, and leave the database to us

Cloud SQL manages your databases so you don't have to, so your business can run without disruption. It automates all your backups, replication, patches, encryption, and storage capacity increases to give your applications the reliability, scalability, and security they need.
Powering the next decade of business messaging | Twilio MessagingX Icon
Powering the next decade of business messaging | Twilio MessagingX

For organizations interested programmable APIs built on a scalable business messaging platform

Build unique experiences across SMS, MMS, Facebook Messenger, and WhatsApp – with our unified messaging APIs.
Omnichannel contact center platform for enterprises. Icon
Omnichannel contact center platform for enterprises.

For Call centers or BPOs with a very high volume of calls

Deliver a personalized customer experience with every interaction, across every channel, with uContact, net2phone’s cloud contact center solution.
Make Your Observability Stack Effortless Icon
Make Your Observability Stack Effortless

For Software Engineers, DevOps, Data Architects, and IT Leaders

The progression to modern application stacks and microservices architectures has resulted in orders of magnitude more logs, metrics, events, and traces. Like gravity, data attracts more data, making it increasingly difficult to move and process as it accumulates over time. More than ever, there is a need to be able to stream-process, filter, mask, transform, aggregate, analyze, and route that data to various data tier destinations optimized for specific usage.

Additional Details for SWIG

Operating Systems

Linux, BSD, Windows

Intended Audience

Developers

User Interface

Command-line

Programming Language

C++, C

Registered

2000-01-19

Last Updated

Categories

Code Generators, Compilers

Maintainers

beazley, olly, wsfulton

Keep Me Updated!