Suggested Categories:

Algorithmic Trading Software
Algorithmic trading software enhances and automates trading capabilities for trading financial instruments such as equities, securities, digital assets, currency, and more. Algorithmic trading software, also known as algo trading software or automated trading software, enables the automatic execution of trades depending on occurrences of specified criteria, indicators, and movements by connecting with a broker or exchange.
Mentoring Software
Mentoring software is a type of software designed to facilitate the mentor-mentee relationship. It provides users with tools for scheduling, tracking progress, providing feedback, and developing plans for growth. The software can be used as a standalone system or integrated into existing enterprise solutions. Mentoring software allows organizations to easily manage and monitor their mentorship programs remotely and efficiently.
Identity Resolution Software
Identity resolution software enables organizations to identify and track the identity of customers, users, or potential customers across multiple devices and services. Identity resolution solutions are very helpful for running personalized campaigns across different channels and devices.
Blockchain Platforms
Blockchain platforms are frameworks that allow developers to create, deploy, and manage blockchain-based applications and services. These platforms provide the underlying infrastructure for building decentralized applications (dApps), executing smart contracts, and enabling secure, transparent transactions. Blockchain platforms are typically built on distributed ledgers, which ensure data immutability, security, and decentralization. Common uses of blockchain platforms include financial services (like cryptocurrency), supply chain management, identity verification, and voting systems. Popular blockchain platforms offer support for consensus mechanisms, scalability, privacy features, and interoperability with other blockchain networks.
Natural Language Generation Software
Natural language generation software is computer-generated software designed to create natural-sounding output. It can generate text from structured data sources such as databases, or from unstructured sources like audio or video recordings. The output of this software can be used for various tasks such as summarizing information or producing news articles. Natural language generation technology is commonly used in applications that require automated content creation and natural language processing algorithms.
Product Recommendation Engines
Product recommendation engines use algorithms and customer data to suggest personalized products to users based on their browsing behavior, past purchases, or preferences. These platforms analyze large sets of data, such as customer interactions and purchase history, to identify patterns and recommend products that are most likely to interest the individual customer. Product recommendation engines help e-commerce businesses increase sales and customer engagement by offering a more personalized shopping experience. By integrating these engines, businesses can provide relevant suggestions, improve conversion rates, and enhance customer satisfaction.
View more categories (6) for "algorithm"
  • 1
    Mercor

    Mercor

    Mercor

    The Mercor platform is currently completely free. Make sure to give the platform a try and invest in, or develop state-of-the-art, algorithms! Outperform the market. Start investing like a pro. Invest in state-of-the-art algorithms. Create your own profile, connect with fellow traders and developers! Build and deploy your algorithm. Make your bot accessible and earn a commission! Mercor disrupts financial markets by building a bridge between algorithmic trading and every-day investors worldwide...
    Starting Price: Free
  • 2
    QANplatform

    QANplatform

    QANplatform

    ... future funds are safe. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers. Quantum-resistant algorithms — also known as post-quantum, quantum-secure, or quantum-safe — are cryptographic algorithms that can fend off attacks from quantum computers.
  • 3
    Hyperledger Sawtooth
    Hyperledger Sawtooth offers a flexible and modular architecture that separates the core system from the application domain, so smart contracts can specify the business rules for applications without needing to know the underlying design of the core system. Hyperledger Sawtooth supports a variety of consensus algorithms, including Practical Byzantine Fault Tolerance (PBFT) and Proof of Elapsed Time (PoET). Originally contributed by Intel, Sawtooth is a blockchain suite designed for versatility...
  • 4
    Seele

    Seele

    Seele

    Seele is powered by anti-asic MPoW algorithm and Seele Sharding Technology for high throughput concurrency with 2000 TPS in the Seele main-net currently as a starting point and highly scalable as demand increases. Seele is fully EVM smart contract compatible. MPoW (Matrix-Proof-of-Work), an innovative PoW consensus algorithm developed by SeeleTech and implemented in Seele’s main-net. Compared to conventional PoW consensus algorithm, MPoW requires miners to compute the determinants of sub...
  • 5
    Solend

    Solend

    Solend

    Solend is the leading algorithmic, decentralized protocol for lending and borrowing on Solana. Anyone with an internet connection can earn interest by lending their assets, and can use their deposits as collateral for borrowing.
  • 6
    Hyperledger Besu

    Hyperledger Besu

    Hyperledger

    Hyperledger Besu is an Ethereum client designed to be enterprise-friendly for both public and private permissioned network use cases. It can also be ran on test networks such as Rinkeby, Ropsten, and Görli. Hyperledger Besu includes several consensus algorithms including PoW, and PoA (IBFT, IBFT 2.0, Etherhash, and Clique). Its comprehensive permissioning schemes are designed specifically for use in a consortium environment. Hyperledger Besu implements the Enterprise Ethereum Alliance (EEA...
  • 7
    Ontology

    Ontology

    Ontology

    Ontology supports identity authentication and data collaboration between users, vehicles, and third parties. Data can only be accessed, used and stored with the consent of the owner. Through the Ontology Trust Framework and Self-Sovereign Data Storage, a number of cryptographic algorithms are implemented to protect user identity and data privacy security. Each data exchange operation requires authorization and selective exchange can be achieved through authorization protocols and cryptographic...
  • 8
    Ampleforth

    Ampleforth

    Ampleforth

    A new paper has been released. This report expands on the motivation, design, and performance of the Ampleforth protocol under live market conditions. AMPL is a cryptocurrency and financial building-block. Much like Bitcoin, it is algorithmic and uncollateralized. However unlike Bitcoin, AMPL can be used to denominate stable contracts. These supply adjustments are called "Rebases" and rebases occur once each day. When the AMPL network grows you'll automatically have more tokens, when the AMPL...
  • 9
    DODO

    DODO

    DODO

    Invest your crypto assets with market-leading liquidity. DODO is a liquidity protocol powered by the Proactive Market Maker (PMM) algorithm and built for capital efficiency. DODO’s contract-fillable liquidity is comparable to centralized exchanges (CEXs). DODO offers a low barrier-to-entry, pain-free token issuance mechanic for long tail assets. Developed by the DODO team, Proactive Market Maker (PMM) is an oracle-aided algorithm with an advanced pricing formula that provides contract...
  • 10
    ACryptoS

    ACryptoS

    ACryptoS

    ACryptoS is a yield farming optimizer designed for the longer-term investor who values sustainable tokenomics, safety and careful risk management. Once assets are deposited into a Vault or StableSwap product, users have the option to Stake the vault or liquidity tokens they receive back respectively into the corresponding farm. ACryptoS StableSwap is an automated market maker (AMM) protocol based on Curve’s specialized algorithm tailored for stable coins. ACryptoS is offering the first AMM...
  • 11
    Genius Yield

    Genius Yield

    Genius Yield

    While DeFi provides many investment opportunities, managing capital is both complex and time-consuming. Genius Yield is your all-in-one solution to benefit from advanced algorithmic trading strategies and yield optimization opportunities. Our Smart Liquidity Management protocol is intuitive, hassle-free, and secure. Genius Yield minimizes risk and maximizes profits. Genius Yield was designed to address the complexity of navigating yield opportunities in DeFi. Our mission is to democratize De...
  • 12
    Polys

    Polys

    Polys

    Online voting platform based on blockchain technology and backed with transparent crypto algorithms. Creating a vote is intuitive, easy and fast. No coding knowledge is required. Voting can be conducted on the go on a smartphone or tablet. Conduct online elections with complete confidence in their reliability. Polys is built by blockchain voting experts. Our first pilot took place in 2016 and since then hundreds of organizations around the world have held elections with our help. With Polys...
  • 13
    Hyperledger Iroha
    Hyperledger Iroha is designed to be simple and easy to incorporate into infrastructural or IoT projects requiring distributed ledger technology. Hyperledger Iroha features a simple construction, modular, domain-driven C++ design, emphasis on client application development and a new, crash fault tolerant consensus algorithm, called YAC. Hyperledger Iroha is a simple blockchain platform you can use to make trusted, secure, and fast applications by bringing the power of permission-based blockchain...
  • 14
    Solarium

    Solarium

    Solarium

    Solarium is a fully decentralised, end-to-end encrypted, censorship-resistant instant messenger based on the Solana blockchain. Solarium is currently in alpha phase, running on the Solana devnet. All messages in Solarium are end-to-end encrypted using the XChaCha20-Poly1305 symmetric encryption algorithm, using a 256-bit content encryption key (CEK) that is shared for all messages in a given channel. The message content in Solarium is not directly signed, i.e. the data itself, once decrypted...
  • 15
    PlatON

    PlatON

    PlatON

    .... By building a computing system assembled by verifiable computation, secure multi-party computation, zero-knowledge proof, homomorphic encryption and other cryptographic algorithms and blockchain technology, PlatON provides a public infrastructure in open source architecture for global artificial intelligence, distributed application developers, data providers and various organizations, communities and individuals with computing needs.
  • 16
    milestoneBased

    milestoneBased

    Applicature

    ..., gets set up as an immutable record on smart contracts, which makes it impossible to tamper with. The key business logic is performed on the blockchain through smart contracts. It’s practically impossible to modify or change the previously made record, and the flow of funds take place in strict accordance to the previously programmed algorithm.
  • 17
    ICObench

    ICObench

    ICObench

    ICObench Data API allows you to get various information and data from the platform including ICO listings, ratings, and stats. This tutorial provides instructions on how to identify the API calls, and walks you through a simple scenario using the API. The API uses the HMAC method with SHA384 algorithm to authenticate the query. Once you are registered and given access to private and public keys for the API, you can request the data from the endpoint. To use the ICObench Data API you need...
  • 18
    Phala

    Phala

    Phala

    Your sensitive data is only processed in hardware secure enclaves isolated from the rest of the world. The integrity of code and data is guaranteed. Only authorization actions are allowed. Phala confidential contract is compatible to multiple standards including Intel SGX and AMD SEV, etc. Secure and reliable data storage and processing based on decentralized storage and our random scheduling algorithm. Remote attestation guarantees the contract runs right inside a trustless and confidential...
  • 19
    KCC

    KCC

    KuCoin Community Chain

    ... every 3 seconds, accelerated transaction confirmation and higher chain performance. Adopt the consensus algorithm of Proof of Staked Authority (PoSA), more efficient, secure and robust. KCC is a decentralized global network with devs and community members from all around the world.
  • 20
    SpiritSwap

    SpiritSwap

    SpiritSwap

    SpiritSwap is a decentralized exchange (DEX) on the Fantom Opera Chain. SpiritSwap's design is based on the Uniswap constant-product automated market maker (AMM). In an AMM, liquidity providers simply deposit a pair of tokens and an algorithm automatically makes markets for the token pair. Traders can easily swap between tokens in the AMM and get guaranteed rates for the swaps. Each swap on SpiritSwap incurs a fee, which gets distributed to liquidity providers as their payment for work. Spirit...
  • 21
    Fortress Lending

    Fortress Lending

    Fortress Lending

    Fortress enables investors to lend and/or borrow cryptocurrencies by pledging the platform an overcollateralized amount of cryptocurrency. This provides investors with the ability to lend assets and earn a compounded annual percentage yield (“APY”) that is paid for by the borrowers. Fortress does this by utilizing money markets, which are pools of assets with algorithmically derived interest rates based on the supply and demand of each asset. Investors can lend or borrow assets on Fortress...
  • 22
    Velas

    Velas

    Velas

    The fork of Solana with embedded EVM integration. Fastest EVM/EBPF hybrid chain inherited best from Solana and applied to EVM world. Supports all smart contracts built on the Ethereum blockchain. Extremely efficient performance at a fraction of the cost. Stake to support decentralization and get rewards. Through the Velas Network users gain access to decentralized services, delegating the security of his passwords, keys or seed-phrases to segmentation algorithms and validators
  • 23
    Radix

    Radix

    Radix

    The only decentralized network that lets you build fast, rewards everyone who makes it better, and scales without friction. A purpose-built DeFi programming environment that will enable fast and secure development. A system of on-ledger royalties that will reward those that contribute dApp code to the ecosystem. A consensus algorithm that will provide unlimited scalability without breaking DeFi composability. Radix is the only decentralized network where developers will be able to build quickly...
  • 24
    Peerplays

    Peerplays

    Peerplays

    .... The peerplays blockchain uses GPoS (Gamified Proof of Stake) consensus algorithm to provide the most transparent, secure, and fairest decentralized system available today. With GPoS, you can grow your Peerplays’ PPY by participating in the blockchain. When you vote, you get a reward for helping make Peerplays safe. This reward is based on how well the Dapps are doing. This way, PPY stays deflationary and goes up in value as it secures the blockchain.
  • 25
    Everscale

    Everscale

    Everscale

    Everscale's architecture demonstrates that when software algorithms are implemented alongside a blockchain's infrastructure, the software itself ceases to be a performance bottleneck, thereby allowing transaction throughput to scale in direct proportion to network bandwidth. As such, Everscale’s architecture satisfies the three fundamental properties of a blockchain, scalability, security and decentralization. At Everscale we are demonstrating that distributed systems research is applicable...
  • 26
    KeyFi

    KeyFi

    KeyFi

    Designed for sophisticated users who want fine grain control over their DeFi assets. Build custom DeFi strategies using the new innovative Strategy Manager. Quotes and research spanning 7,000+ tokens, 400+ exchanges, and 50+ unique news sources. Unlimited, custom portfolio alerts to Telegram, email, and SMS. Discover new tokens based on algorithmic analysis of your holdings. Earn KEYFI rewards by staking KEY, KEYFI, USDC, and more, as well as providing liquidity on Uniswap and PancakeSwap. You...
  • 27
    Risk Harbor

    Risk Harbor

    Risk Harbor

    Risk management marketplace for Web3. An algorithmic, transparent, and impartial protocol that removes the need for trusted intermediaries. Protect against smart contract risk and network vulnerabilities. Invest safely and earn risk-adjusted rewards by providing protection. Maximize capital efficiency with market-informed dynamic pricing. Purchase protection and secure your capital. Risk Harbor programmatically secures your assets against a wide spectrum of risks, exploits, and attacks. Get...
  • 28
    Swop.fi

    Swop.fi

    Swop.fi

    Swop.fi combines several types of liquidity pools. Each liquidity pool is implemented as a smart contract. The exchange rate is determined by algorithmic pricing and depends only on the amounts of tokens stored on the smart contract. Pools use different price calculation formulas that are most suitable for each specific token pair. Swop.fi is implemented on the Waves blockchain, known for its high transaction speed and low network fees. Swop.fi mechanics incentivize long-term investors and SWOP...
  • 29
    CUBE3.AI

    CUBE3.AI

    CUBE3.AI

    Protect your smart contracts by blocking malicious transactions rather than pausing your applications. Our advanced machine learning (ML) algorithms continuously monitor your smart contracts and transactions to provide real-time risk assessments, ensuring your web3 applications are protected against vulnerabilities, exploits, and compliance risks. Protect platform offers robust defenses against cyber exploits, wallet hacks, fraud, vulnerabilities, and compliance risks. By implementing our Real...
  • 30
    Step Network

    Step Network

    Step Network

    Blockchains compete for market share in financial apps. The pursuit of financial decentralization is admirable, but an exclusive focus on this lacks life. Step Protocol is a network for life, not trading algorithms, a network for humanity’s pursuit of lifestyle, fitness, and consumption. Step Network is built with Avalanche’s code, with added elements. This brings the proven network security of an established codebase to a faster throughput. this is a foundation for internet-scale apps for life...
    Starting Price: Free
  • Previous
  • You're on page 1
  • 2
  • Next