Showing 4 open source projects for "format"

View related business solutions
  • Cycloid: Hybrid Cloud DevOps collaboration platform Icon
    Cycloid: Hybrid Cloud DevOps collaboration platform

    For Developers, DevOps, IT departments, MSPs

    Enable your developers to do their best work and increase time-to-market speed with a leading DevOps and Hybrid Cloud platform.
    Learn More
  • Share your screen instantly while on a phone call with CrankWheel for an engaging presentation. Icon
    Share your screen instantly while on a phone call with CrankWheel for an engaging presentation.

    For salespeople and customer service agents who want to compliment their phone calls with visual elements.

    Our 10x simpler screen sharing tool is designed for you if you spend your days on the phone with clients, and need to add a visual presentation to close sales. No more scheduling a follow-up meeting, or teaching them to use a complex tool. Send them a text message or email, and they see your screen in seconds.
    Learn More
  • 1
    Parallel and Distributed Process System

    Parallel and Distributed Process System

    NOTICE OF CONSOLIDATION & PARTNERSHIP PENDING As of April 2026, the 20

    NOTICE OF CONSOLIDATION & PARTNERSHIP PENDING As of April 2026, the 20 pipelines of the QCAUS/PDPBioGen suites are undergoing consolidation for high-scale institutional research. Core 'Ford 2026' algorithms remain the proprietary IP of the Ford Peace and Justice Foundation. Academic users at partner institutions are currently performing validation; all other commercial inquiries must contact the author Computational Neuroscience: Large-scale neural population dynamics, brain-inspired...
    Downloads: 10 This Week
    Last Update:
    See Project
  • 2
    Qbsolv

    Qbsolv

    A decomposing solver

    Qbsolv,a decomposing solver, finds a minimum value of a large quadratic unconstrained binary optimization (QUBO) problem by splitting it into pieces solved either via a D-Wave system or a classical tabu solver. (Note that qbsolv by default uses its internal classical solver. Access to a D-Wave system must be arranged separately.)
    Downloads: 8 This Week
    Last Update:
    See Project
  • 3
    ScaffCC

    ScaffCC

    Compilation and optimization framework for the Scaffold language

    ...It is for the purpose of writing and analyzing code for quantum computing applications. ScaffCC enables researchers to compile quantum applications written in Scaffold to a low-level quantum assembly format (QASM), apply error correction, and generate time and area metrics. It is written to be scalable up to problem sizes in which quantum algorithms outperform classical ones, and as such provide valuable insight into the overheads involved and possible optimizations for a realistic implementation on a future device technology.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    bitrate-xls

    calculator for avi-file streams

    A "bitwise precision tool" bitrate calculator using MS-EXCELL programming. The results are used for DVD Video to audio-video streams. It helps compute VIDEO- & AUDIO-Bitrates, aspect ratio, screen size, choose audio format cbr. Has units MB,pixel,d:h:m:s, kbps, etc
    Downloads: 0 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB