Your top-rated shield against malware and online scams | Avast Free Antivirus
Browse and email in peace, supported by clever AI
Our antivirus software scans for security and performance issues and helps you to fix them instantly. It also protects you in real time by analyzing unknown files before they reach your desktop PC or laptop — all for free.
Free Download
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
deltasql is an advanced Database Schema Version Control. It allows a team to commonly develop a data model on the fly, while the source code is growing. Sync algo supports branches and tags. Works for postgreSQL, Oracle, mySQL, MariaDB, Microsoft SQL Server or any SQL-like db.
minimal benchmark code for Counting Set Bits (ones) in an Integer
I was curious how much better the Algorithms, pointed out by BitTwiddling Hacks, perform than a simple Lookup Table approach...
Now I think, perhaps my little investigation is interesting for others too...
PS: the parallel counting Algo is about 35% faster on average on my computers than a simple LUT based solution. Also this shows nicely how different a human brain compatible solution is to a binary machine optimal solution :-)
In the meantime I added other Algorithms beside countbisset...
... safety due to the use of pointer to void for type abstraction.
This code is intentionally spartan. With the exception of a handful of assertions placed as an aid to debugging for the most common or fatal errors (underflow in pop operations, allocation failures), this library makes no attempt to protect itself.
Please read 'algo' function documentation. Some of the functions have different behavior than the standard library equivalents.
j-Algo is an algorithm visualization tool, especially useful for students and lecturers of computer science. It is written in Java and platform independent. j-Algo is developed at Dresden University of Technology.
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Es un programa generado con blender 3D pensado para ayudar a mi hijo de 5 años a usar el teclado y que relacione audiovisualmente la posicion de cada tecla y disfrute de una experiencia interactiva que yo he diseñado. Además de familiarizarse con la herramienta, me permite demostrarle que la tecnología no es algo utópico o inalcanzable, hasta papá puede armar algo en la computadora.
A free compiler for the algo language used to describe and implement algorithms in EPITA, a French software engineering school. See (FR) http://nathalie.bouquet.free.fr/epita/algo/langage/structure.php for a detailed grammar description.
Truco! o algo... is a Java version of a game called Truco, wich is played in South America, mostly by groups of drunk friends that yell all along the game. It supports online playing and is quite fun! Give it a try!
MUSASH provides a utility to digest text, file and a byte char. It also able to compare two files, compare file, text and char to a hash. It also allows user to search for a string that evaluates to a hash given. Supported algo: MD5, SHA1 and SHA2 family
This program is based on a algorithm that solves a Master Mind combination.
The algo seems to work but without hole and with 5 different colors in an atempt.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.