Showing 30 open source projects for "disk"

View related business solutions
  • Empower Your Contact Center with Human-Like AI Conversations Icon
    Empower Your Contact Center with Human-Like AI Conversations

    Deliver faster resolutions, lower costs, and better CX without hiring another agent.

    Enterprise Bot, based in Switzerland, is a pioneer in Conversational AI, Process Automation, and Generative AI. With the trust of esteemed enterprise giants across industries like Generali, SIX, SBB, DHL, and SWICA, Enterprise Bot is revolutionizing both customer and employee experiences. Through its advanced integration with Large Language Models (LLM) such as ChatGPT and Llama 2, and its unique patent-pending DocBrain technology, the company delivers unparalleled personalization, active engagement, and omnichannel solutions across platforms like email, voice, and chat. Furthermore, Enterprise Bot integrates with existing core systems, such as SAP, CRMs, Confluence and more, and with its proprietary middleware, Blitzico, enables the AI to not only respond to queries but also take action to resolve them. This dedication to innovation in four main use case areas, Customer Support, Sales and Marketing, Knowledge Management and Digital Coworker, elevates both CX and employee productivity.
    Learn More
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • 1

    HRCloud2

    A full-featured home hosted Cloud Drive, Personal Assistant, App Launc

    HRCloud2 - A fully featured home-hosted Cloud drive and personal assistant that allows users to create and manage user accounts for friends and family, access files from anywhere, convert files and archives to other formats, perform simple image resizing and editing, stream media, create playlists, search for files, OCR images and PDF's, share files with friends and more! Building off the observed industry standards for commercial Cloud storage, HRCloud2 protects server permission levels,...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2

    GA-EoC

    GeneticAlgorithm-based search for Heterogeneous Ensemble Combinations

    In data classification, there are no particular classifiers that perform consistently in every case. This is even worst in case of both the high dimensional and class-imbalanced datasets. To overcome the limitations of class-imbalanced data, we split the dataset using a random sub-sampling to balance them. Then, we apply the (alpha,beta)-k feature set method to select a better subset of features and combine their outputs to get a consolidated feature set for classifier training. To...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3
    A Disk Scheduling Simulator tool. With an intuitive GUI interface and command line functionality. Built using both VC and VB. Currently supports SSTF,LOOK,CLOOK,SCAN and CSCAN algorithms. Rotational latency is also optionally supported.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    yagf

    yagf

    YAGF is a tesseract and cuneiform wrapper and helper*

    ...Once you have a scanned image you can prepare it for recognition, select particular image areas for recognition, set the recognition language and so on. Recognized text is displayed in a editor window where it can be corrected, saved to disk or copied to clipboard. YAGF also provides some facilities for a multi-page recognition (see the online help for more details).
    Downloads: 5 This Week
    Last Update:
    See Project
  • Create and run cloud-based virtual machines. Icon
    Create and run cloud-based virtual machines.

    Secure and customizable compute service that lets you create and run virtual machines.

    Computing infrastructure in predefined or custom machine sizes to accelerate your cloud transformation. General purpose (E2, N1, N2, N2D) machines provide a good balance of price and performance. Compute optimized (C2) machines offer high-end vCPU performance for compute-intensive workloads. Memory optimized (M2) machines offer the highest memory and are great for in-memory databases. Accelerator optimized (A2) machines are based on the A100 GPU, for very demanding applications.
    Try for free
  • 5
    VOC-DPM

    VOC-DPM

    Object detection system using deformable part models (DPMs)

    ...The code integrates several enhancements: a star-cascade detection algorithm to speed up screening, context rescoring (re-ranking detections using contextual information), and various optimizations like in-memory training (rather than large on-disk data files).
    Downloads: 0 This Week
    Last Update:
    See Project
MongoDB Logo MongoDB