Iris Powered By Generali - Iris puts your customer in control of their identity.
Increase customer and employee retention by offering Onwatch identity protection today.
Iris Identity Protection API sends identity monitoring and alerts data into your existing digital environment – an ideal solution for businesses that are looking to offer their customers identity protection services without having to build a new product or app from scratch.
Learn More
The full-stack observability platform that protects your dataLayer, tags and conversion data
Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.
Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast.
No manual QA. No unreliable data. Just data you can trust and act on.
HashSum is a .NET port from GNU's md5sum and sha1sum. It supports: hash algorithm selection between MD5 and SHA1 (more could be added later) and compatibility between HashSum and GNU's checksum file format
ATTENTION: For more info and latest version, refer to https://github.com/estigma88/jdhtuq.
jDHTUQ is a peer-to-peer DHT system based in Chord algorithm, but built like API to generalize the implementation of peer-to-peer DHT systems. jDHTUQ have two fundamental services , put and get of resource.
A P2P overlay construction toolkit, which supports routing algorithm researchers in addition to application developers. It provides multiple routing (DHT) algorithms such as Chord, Kademlia, Koorde, Pastry and Tapestry, and a distributed environment emu
THIS IS A NETBEANS 8.02 PROJECT
ENGLISH ONLY
This program was made to help me with the patent research.
It simply generates the search keywords, based on your upvotes or a downvotes of the input parameters.
It can accept a text or URL (text takes a prescedence over the URL).
If you input URL, it goes to a page, and learns its text from HTML format.
This program is intelligent as it predicts what you may want to search next, based on your personal trends.
After searching the...
Discover and manage administrator, service, and web app passwords, keys, and identities. Automate management with approval workflows. Centrally control, audit, monitor, and record all access to critical IT assets.
Please click on "BROWSE ALL FILES" to open a README!
What is this program?
This program is meant to search the texts and suggest sentences that might follow any inputted sentence. It was meant to help composing the writings.
How was it made?
First, I made a chatterbot to understand the concept of "predicting" the next sentence (worked as good as the Cleverbot), then I made this program that is aided by an user to compose the new writings.
SAMPLE:
Input sentence was "Learning...
Ex-Crawler is divided into 3 subprojects (Crawler Daemon, distributed gui Client, (web) search engine) which together provide a flexible and powerful search engine supporting distributed computing. More informations: http://ex-crawler.sourceforge.net
The implementation of Bee Hive @ Work algorithm that simulates the foraging behavior of honey bees in nature. The aim is to provide an extensible framework that can be used by researchers to simply create new applications of this algorithm.
Java port of Mozilla's automatic charset detection algorithm. See... <a href="http://www.mozilla.org/projects/intl/chardet.html"> http://www.mozilla.org/projects/intl/chardet.html </a>for the details of the orginal code and Author.
Run applications fast and securely in a fully managed environment
Cloud Run is a fully-managed compute platform that lets you run your code in a container directly on top of scalable infrastructure.
Run frontend and backend services, batch jobs, deploy websites and applications, and queue processing workloads without the need to manage infrastructure.
This project intends to create an indexing search engine, for knowledge management. The primary object is to apply an information retrieval core. And implement a knowledge data discovery theory such as data mining algorithm, text mining.
It moves by itself inside networks like virus infection & plagues, it is being written to solve computer virus problem drastically and responsibly. It is legal, free and open for public domain to improve W3 ICT Security.