Showing 14 open source projects for "hash"

View related business solutions
  • Skillfully - The future of skills based hiring Icon
    Skillfully - The future of skills based hiring

    Realistic Workplace Simulations that Show Applicant Skills in Action

    Skillfully transforms hiring through AI-powered skill simulations that show you how candidates actually perform before you hire them. Our platform helps companies cut through AI-generated resumes and rehearsed interviews by validating real capabilities in action. Through dynamic job specific simulations and skill-based assessments, companies like Bloomberg and McKinsey have cut screening time by 50% while dramatically improving hire quality.
    Learn More
  • Download the most trusted enterprise browser Icon
    Download the most trusted enterprise browser

    Chrome Enterprise brings enterprise controls and easy integrations to the browser users already know and love.

    Chrome Enterprise is ideal for businesses of all sizes, IT professionals, and organizations looking for a secure, scalable, and easily managed browser solution that supports remote work, data protection, and streamlined enterprise operations.
    Learn More
  • 1
    Essentials

    Essentials

    General purpose utilities and hash functions for Android and Java

    Essentials is a lightweight collection of high-performance utility classes designed to enhance standard Java and Android development without introducing heavy dependencies. The library focuses on providing efficient data structures and helper utilities that often outperform equivalent components in the standard Java API. It is intentionally minimalistic and is not positioned as a full framework, but rather as a focused toolkit that fills common gaps developers encounter in everyday projects....
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    sls

    SLS Team Java Library

    Java library with Cryptographic algorithms. Easy to use Crypto algorithms. Works on Windows, Linux, Android. No external lib dependencies, no useless abstractions, no 'crypto provider'. Elliptic curves was borrowed from BouncyCastle and simplified a lot. Most of EC classes are custom algorithms for certain curves. Can be easily deleted if u dont need them. With couple of classes u can parse and construct those ugly ASN.1 structures, look at RSA and EC key formats for example. No...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 3

    rubycollect4j

    Ruby Collections for Java

    The rubycollect4j implements all methods refer to Ruby Array, Hash and Enumerable. For further info, please visit http://ruby-doc.org website. For more documentation, please read JavaDoc. With Java 8: // Sort the characters by its frequency based on the word 'Mississippi' case-insensitively RubyArray<String> word = ra("Mississippi".split("(?!^)")); String result = word.map((c) -> { return c.toLowerCase(); }).sortBy((c) -> { return word.count(c); }).uniq().join(); p(result); // "mpis" With Java 6: // Sort the characters by its frequency based on the word 'Mississippi' case-insensitively final RubyArray<String> word = newRubyArray("Mississippi".split("(?!...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4

    Immutable Collections for Java

    Immutable/Persistent Collections Library

    ...The library includes a singly linked (cons/cddr style) list/stack, an integer trie based indexed list, a 2-3 tree based random access indexed list, a 2-3 tree based map, a hash trie based map, and hash and tree based sets, and sparse arrays. All collections provide immutable Cursor as well as standard Iterator classes for looping through all elements. A utility class provides functional style algorithmic processing of Cursors including foldLeft, foldRight, collect, select, and reject. The 2-3 tree and integer trie classes are optimized for performance and can be used alongside java.util Collections when immutability is needed for safe data sharing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Queue Management System for Busy Service Providers | WaitWell Icon
    Queue Management System for Busy Service Providers | WaitWell

    The queue management system that perfectly adapts to your workflows

    The queue management system that perfectly adapts to your workflows. Improve operational efficiency in weeks with the most configurable enterprise queue system.
    Learn More
  • 5
    MD5Sum-gui

    MD5Sum-gui

    MD5sum is an utility that calculates 128-bit MD5 hash

    MD5sum is a little utility that helps you to calculate 128-bit MD5 hashes for a given string, as described in RFC 1321.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 6
    Concurrent hash map and linked list implementation of the ConcurrentMap interface, with predictable iteration order. This implementation differs from ConcurrentHashMap in that it maintains a doubly-linked list running through all of its entries.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    jLikeRuby
    Java facades in Ruby style. You can use many ruby methods (first, each, join, collect, deleteIf..) for basic classes (Array, String, Hash...). These Java methods work as in Ruby. About 60% of code coverage.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8
    It's a tool for testing HTTP servers and Web applications. It supports HTTP/HTTPS protocols, GET,POST and HEAD methods, HTTP proxies, refferes and cookies. It's like HTTP Debugger in network tool AccessDiver or HAS.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 9
    Login
    Login system! mySQL /JDBC Demonstrates the use of secured Hash functions in java
    Downloads: 0 This Week
    Last Update:
    See Project
  • Modernize Your Lab with the #1 Rated LIMS Icon
    Modernize Your Lab with the #1 Rated LIMS

    Labs that need a powerful LIMS system

    Nothing is more critical to a lab’s success than the quality, security, and traceability of samples. The Lockbox LIMS system provides robust sample management functionality to laboratory professionals, giving them full visibility on every aspect of a sample’s journey, from accessioning to long-term storage.
    Learn More
  • 10
    A utility that uses the shebang (hash-bang) mechanism to create self-contained executable java applications that require no support files and can be executed on the unix command line
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Simulation too for assessing the availability of Peer-to-Peer storage schemes, such as Distributed Hash Tables, Bucketing, and Replication.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    Meta-Ja is to Java what C++ was to C - it lets you express Java class hierarchies at a higher level of abstraction, and then writes XML Schema files, constructors, hash-access type-safe lists, get, set, copy, print, and XML parsing/generation functions.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    Synclair is a tool for diff'ing and synchronizing directories. It also includes a utility to find duplicate files (by name, or md5 hash). It is a command line tool, written in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Verifier/validator for the install4J commercial Java installer. Uses a simple hash comparison taken remotely and a local installation binary. Code is in subversion!
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB