10 projects for "dump process java" with 1 filter applied:

  • Apify is a full-stack web scraping and automation platform helping anyone get value from the web. Icon
    Apify is a full-stack web scraping and automation platform helping anyone get value from the web.

    Get web data. Build automations.

    Actors are serverless cloud programs that extract data, automate web tasks, and run AI agents. Developers build them using JavaScript, Python, or Crawlee, Apify's open-source library. Build once, publish to Store, and earn when others use it. Thousands of developers do this - Apify handles infrastructure, billing, and monthly payouts.
    Learn More
  • Enterprise-Class Managed File Transfer. Icon
    Enterprise-Class Managed File Transfer.

    For organizations that need to automate secure file transfers to protect sensitive data.

    Diplomat MFT by Coviant Software is a secure, reliable managed file transfer solution designed to simplify and automate SFTP, FTPS, and HTTPS file transfers. Built for seamless integration, Diplomat MFT works across major cloud storage platforms, including AWS S3, Azure Blob, Google Cloud, Oracle Cloud, SharePoint, Dropbox, Box, and more.
    Learn More
  • 1
    COOK

    COOK

    Software build-automation tool written in Common Lisp

    COOK is a software build-automation tool made with a goal of letting you, the programmer, to utilize the most elegant and powerful programming language - Common Lisp - for managing your software builds. You write a recipe file which describes what objectives must be constructed. COOK will load and process this file, then produce either a regular Makefile or a Bourne Shell script, which will actually perform the task of building and installing your targets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    SW Test Automation Framework
    The Software Testing Automation Framework (STAF) is a framework designed to improve the level of reuse and automation in test cases and test environments. The goal of STAF is to provide a complete end-to-end automation solution for testers.
    Downloads: 63 This Week
    Last Update:
    See Project
  • 3
    SWAT

    SWAT

    Security Workflow Analysis Tool

    The Security Workflow Analysis Tool (SWAT) is a platform for modelling and analyzing workflows. It comes with ananlysis approaches to search for data leaks in workflows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Cluster Orchestrator

    orchestrator / cluster deployment tool

    The Orchestrator server is responsible for distribution and launch of simple apply/rollback shell scripts in a particular order across multiple servers . If for any reason deployment is failing at a particular stage the process will stop and you can rollback any changes done until then. In case you want to deploy your code or just call your preferred DSC client to apply the configuration locally the Orchestrator can be a handy tool. The operation can be started manually or scheduled,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Melis Platform is an enterprise-grade Low Code Platform simplifying app creation, management, and delivery. Icon
    Melis Platform is an enterprise-grade Low Code Platform simplifying app creation, management, and delivery.

    Ideal for websites, apps, e-commerce, CRMs, and more

    Melis is a new generation of Content Management System and eCommerce platform to achieve and manage websites from a single web interface easy to use while offering the best of open source technology.
    Learn More
  • 5

    ShapeRecognition

    Shape recognition for video games using fast algorithms (heuristics).

    This project is a really small software that can be used as a demonstration of my own shape recognition algorithms. There are a process during the shape drawing and a post-processing when it is done. Finally the shape recognition is launched. All the algorithms are done for real time gaming. So they are heuristics and do not give the optimal solution. Yet the given solution is generally a good one. In this demonstration, few shapes can be recognized: * circles * triangles * lines...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    ARecordUpdater

    ARecordUpdater

    An application that automatically updates A-Records for certain hosts.

    ...Written in Java and runs on any machine with Java installed.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7

    Vireo ETD Management System

    Vireo: a turnkey Electronic Thesis and Dissertation Management System

    NOTE: There is a new version of Vireo. It is hosted on github at: https://github.com/TexasDigitalLibrary/Vireo This version of Vireo is no longer supported. ---------------------------------------------------------- Vireo is a turnkey Electronic Thesis and Dissertation (ETD) Management System developed by the Texas Digital Library that addresses all steps of the ETD process, from submission to publication to preservation. Vireo provides students the ability to submit their digital...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    Socr3 is a plugin-oriented, open source platform upon which I'm building an OCR suite. The name Socr3 stands for "Open Source Optical Character Recognition, Reading, Rendering, and Exporting", and is subject to change in the future.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    LibJPopupGate is a libjpopup based java library, involving some changes concerning code reusability and portability and a framework used to simplify process of creating gates between winpopup network protocol and whatever wanted user interface.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • 10
    Spine provides a means of using inversion of control(dependency injection) techniques to create a multi tier application by using a generic model to instantiate java classes specified in configuration along a defined process flow.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB