Get Avast Free Antivirus with 24/7 AI-powered online scam detection
Get protection for today’s online threats. Free.
Award-winning antivirus protection, as well as protection against online scams, dangerous Wi-Fi connections, hacked accounts, and ransomware. It includes Avast Assistant, your built-in AI partner, which gives you help with suspicious online messages, offers, and more.
Free Download
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
High-level, meta-language, trans-compiler with virutal machine
XièXiè is a language with a trans-compiler (or rather source-to-source compiler) which compiles to mainly C++ (C++98 and C++11).
It also comes with an own assembler compiler for ARM, IA-32/ x86 and its own byte-code XBC (XièXiè-Byte-Code) including a virtual-machine.
XièXiè can be seen as a "Meta Language".
--- THIS PROJECT IS IN IT'S FIRST STEPS ---
A script(ing/ed/able) optimizing compiler for the C and Objective-C languages (and in the future other languages such as C++, D and Java). Written in a scripting language to allow for experimentation with code generation and optimization techniques.
The purpose of this project is to modify SmartEiffel to allow it to be used to create applications for mobile device platforms such as Symbian, BREW, and J2ME. Currently the codebase is based on SmartEiffel 1.0, but we are looking into moving over to Sma
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.