Showing 4 open source projects for "virtual radionic machine"

View related business solutions
  • Enterprise AI Agents for Every Customer Moment Icon
    Enterprise AI Agents for Every Customer Moment

    For enterprise companies looking for AI Agents

    From chat to voice to SMS, every conversation gets a smart, personalized response powered by your policies, tone, and data.
    Learn More
  • Deliver trusted data with dbt Icon
    Deliver trusted data with dbt

    dbt Labs empowers data teams to build reliable, governed data pipelines—accelerating analytics and AI initiatives with speed and confidence.

    Data teams use dbt to codify business logic and make it accessible to the entire organization—for use in reporting, ML modeling, and operational workflows.
    Learn More
  • 1
    Finagle

    Finagle

    A fault tolerant, protocol-agnostic RPC system

    ...We set out to develop a single implementation of the basic components of network servers and clients that could be used for all of our protocols. Finagle is a protocol-agnostic, asynchronous Remote Procedure Call (RPC) system for the Java Virtual Machine (JVM) that makes it easy to build robust clients and servers in Java, Scala, or any JVM-hosted language.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2

    Mathematical Assistant on Web

    Mathematical computations in browser, steps included.

    Mathematical Assistant on Web is a web interface for Maxima computations, including steps in the solution. The demo site is http://um.mendelu.cz and covers selected problems typical for courses of calculus on technical universities.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    Data exchange is a core part of all cloud systems so it becomes necessarily important to control access to data that are confidential and whose integrity influences the state of the system at any time.It can be proven that the administrator in a IaaS can easily perform some hidden and malicious task on unsuspecting customer machine. This is attributed to the fact that he/she possesses the root privilege to do so and forms an attack. A cold boot attack can easily be lauched amongst other attacks by the privilege user or system administrator.A simple attack scenario could be that a customer pays a virtual machine at Amazon EC2 (Provider) and the systemadmin (Privilidged User) who is, for instance, threatened to be fired, has access to the same virtual machine state, this priviledged user can easily leak customer’s data. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    GandiCloud
    An open source client to manage cloud hosting resources at Gandi.Net via the public API. Written in C++ with Qt4. Multi-language and cross-platform. Runs on Linux, MacOS X, and Windows.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Respond 100x faster, more accurately, and improve your documentation Icon
    Respond 100x faster, more accurately, and improve your documentation

    Designed for forward-thinking security, sales, and compliance teams

    Slash response times for questionnaires, audits, and RFPs by up to 90%. OptiValue.ai automates the heavy lifting, freeing your team to focus on strategic priorities with intuitive tools for seamless review and validation.
    Learn More
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB