Showing 2 open source projects for "create patterns"

View related business solutions
  • The Most Powerful Software Platform for EHSQ and ESG Management Icon
    The Most Powerful Software Platform for EHSQ and ESG Management

    Addresses the needs of small businesses and large global organizations with thousands of users in multiple locations.

    Choose from a complete set of software solutions across EHSQ that address all aspects of top performing Environmental, Health and Safety, and Quality management programs.
    Learn More
  • AestheticsPro Medical Spa Software Icon
    AestheticsPro Medical Spa Software

    Our new software release will dramatically improve your medspa business performance while enhancing the customer experience

    AestheticsPro is the most complete Aesthetics Software on the market today. HIPAA Cloud Compliant with electronic charting, integrated POS, targeted marketing and results driven reporting; AestheticsPro delivers the tools you need to manage your medical spa business. It is our mission To Provide an All-in-One Cutting Edge Software to the Aesthetics Industry.
    Learn More
  • 1
    ContainerSSH

    ContainerSSH

    ContainerSSH: Launch containers on demand

    ...Perfect for vendor and student labs. Provide production access to your developers, give them their usual tools while logging all changes. Authorize their access and create short-lived credentials for the database using simple webhooks. Clean up the environment on disconnect. Study SSH attack patterns up close. Drop attackers safely into network-isolated containers or even virtual machines, and capture their every move using the audit logging ContainerSSH provides. The built-in S3 upload ensures you don't lose your data.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    lmctfy

    lmctfy

    lmctfy is the open source version of Google’s container stack

    lmctfy is Google’s open-source container runtime that exposed Linux cgroups and namespaces through a higher-level API, predating the widespread adoption of modern container tools. It offered a daemon and client for creating, updating, and destroying resource-isolated “containers” with quotas on CPU, memory, and other subsystems. The project focused on operational safety—clean hierarchies, accounting, and predictable behavior under resource pressure—reflecting lessons from running containers...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next