[go: up one dir, main page]

Showing 4 open source projects for "pseudo code"

View related business solutions
  • Gen AI apps are built with MongoDB Atlas Icon
    Gen AI apps are built with MongoDB Atlas

    The database for AI-powered applications.

    MongoDB Atlas is the developer-friendly database used to build, scale, and run gen AI and LLM-powered apps—without needing a separate vector database. Atlas offers built-in vector search, global availability across 115+ regions, and flexible document modeling. Start building AI apps faster, all in one place.
    Start Free
  • White Labeled Fintech Software Solutions | Centrex Icon
    White Labeled Fintech Software Solutions | Centrex

    Centrex is a full suite of white labeled fintech solutions built and designed for brokers, lenders, banks, investors, fintechs

    The Centrex products include: CRM, loan origination, loan and advance servicing software, syndication management, white labeled mobile app, money manager, underwriting, Esign, and website smart app builder. The Centrex services include: fintech software consulting, admin retainer services, and managed data cloud.
    Learn More
  • 1
    DeepCluster

    DeepCluster

    Deep Clustering for Unsupervised Learning of Visual Features

    ...DeepCluster was one of the early successes in unsupervised visual feature learning, demonstrating that clustering-based reformulation can rival supervised baselines for many downstream tasks. The repository includes code for feature extraction, clustering, training loops, and evaluation benchmarks like linear probes. Because of its simplicity and modular design, DeepCluster has inspired many later methods.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    Gutmann Algorithm Secure File Deletion

    Using Gutmann method for securely deleting files in Windows.

    Gutmann method uses 35 passes over the region to be deleted, 8 of them are Pseudo-random. Considered by some to be highly effective for preventing file recovery. Requires .NET Framework 4.0 --- Systems & Safety Establishment https://sarab.me Source Code available in c# with comments. Reference: http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
    Downloads: 5 This Week
    Last Update:
    See Project
  • 3
    Fiwix

    Fiwix

    A UNIX-like kernel for the i386 architecture

    FiwixOS 3 is a Fiwix distribution, an operating system made from a software collection that is based upon the Fiwix kernel. It basically comprises a Fiwix kernel, GNU tools, libraries and additional software. All the included software is free and open-source software made available both as compiled binaries and in source code form, which allows modifications to the original software. FiwixOS 3 uses the Newlib v3.1.0 as its C standard library, and the Ext2 as its primary file...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    AppInventor on a VM or Flash Drive

    AppInventor Personal Private Server on Linux VM or Flash Drive

    ...Two flavors are iincluded: Vmware Virtual Machine and a Bootable Flash Drive image. Google Appinventor is a graphical blocks based development environment for Android devices. Google ended the their support of the project and released the code to MIT for educations support. MIT periodically releases JAR files in a pseudo open project. This self contained project used unmodified MIT jars. The project allows a users to develop, save and build a running application that can be downloaded to the phone, shared with others and potentially modified to place in the Google Market / Play service. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Monitoring, Securing, Optimizing 3rd party scripts Icon
    Monitoring, Securing, Optimizing 3rd party scripts

    For developers looking for a solution to monitor, script, and optimize 3rd party scripts

    c/side is crawling many sites to get ahead of new attacks. c/side is the only fully autonomous detection tool for assessing 3rd party scripts. We do not rely purely on threat feed intel or easy to circumvent detections. We also use historical context and AI to review the payload and behavior of scripts.
    Learn More
  • Previous
  • You're on page 1
  • Next