Search Results for "sourceforge.net/projects/winpython/files/winpython_3.8/3.8.10.0/winpython64-3.8.10.0.7z"

Showing 4 open source projects for "sourceforge.net/projects/winpython/files/winpython_3.8/3.8.10.0/winpython64-3.8.10.0.7z"

View related business solutions
  • End-To-End Document Management Software Icon
    End-To-End Document Management Software

    UnForm is ideal for businesses focusing on distribution, manufacturing ERP solutions, and general accounting.

    UnForm® is a platform-independent software product that creates, delivers, stores and retrieves graphically enhanced documents from ERP application printing. A complete, end-to-end document management solution, UnForm interfaces at the point of printing to produce documents in various formats for printing and electronic delivery.
    Learn More
  • MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design. Icon
    MicroStation by Bentley Systems is the trusted computer-aided design (CAD) software built specifically for infrastructure design.

    Microstation enables architects, engineers, and designers to create precise 2D and 3D drawings that bring complex projects to life.

    MicroStation is the only computer-aided design software for infrastructure design, helping architects and engineers like you bring their vision to life, present their designs to their clients, and deliver their projects to the community.
    Learn More
  • 1
    Umbrel

    Umbrel

    A beautiful personal server OS for Raspberry Pi or any Linux distro

    ...All our interactions on the internet today are mediated by a few companies who offer “free” services in exchange for storing our data on their servers to spy on us. Running a personal server fundamentally changes that. You and your family’s photos, videos, files, notes, passwords, everything, have nothing to do with someone else’s computer. They’re a part of your private life, and now they can all be stored by you, in your home, on your Umbrel. The Bitcoin network is made up of thousands of nodes that verify every single transaction in the blockchain. Some of them mine Bitcoin too, but unlike a mining node, running a non-mining node doesn’t require expensive hardware. ...
    Downloads: 92 This Week
    Last Update:
    See Project
  • 2
    Diplomacy Cicero

    Diplomacy Cicero

    Code for Cicero, an AI agent that plays the game of Diplomacy

    ...The codebase is implemented primarily in Python with performance-critical components in C++ (via pybind11 bindings) and is configured to run in a high‐GPU cluster environment. Configuration is managed via protobuf files to define tasks such as self-play, benchmark agent comparisons, and RL training. The project is now archived and read-only, reflecting that it is no longer actively developed but remains publicly available for research use.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3
    muse

    muse

    AI agent memory system—pure Markdown, zero dependencies, fully local

    MUSE gives AI coding agents persistent cross-session memory and multi-role governance through plain Markdown files. Supports Claude Code, OpenClaw, Cursor, Windsurf, Gemini CLI, and Codex via one-command install. Built-in MCP Server for programmatic access. 56 skills, auto memory capture, semantic compression, role-based governance, multi-project management. Pure Markdown, no database, no cloud. MIT open source.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 4
    ...Developer & Copyrighted by : TonTon Hsien-De Huang Prompter: Jazz Yao-Tsung Wang, Figaro Chen-Ho Yang | Logo Desinger:Temaki Guo Community on Google+:http://X.TWMAN.ORG/Community/ SourceForge: https://sourceforge.net/projects/twmanplus/files/ FaceBook: https://www.facebook.com/TWMAN.PLUS
    Downloads: 1 This Week
    Last Update:
    See Project
  • Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes. Icon
    Next-generation security awareness training. Built for AI email phishing, vishing, smishing, and deepfakes.

    Track your GenAI risk, run multichannel deepfake simulations, and engage employees with incredible security training.

    Assess how your company's digital footprint can be leveraged by cybercriminals. Identify the most at-risk individuals using thousands of public data points and take steps to proactively defend them.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB