Search Results for "calendar application software source code in java using swing"

Showing 5 open source projects for "calendar application software source code in java using swing"

View related business solutions
  • Reliable Phone Service for Your Home or Business Icon
    Reliable Phone Service for Your Home or Business

    Businesses that want a modern business phone system using their current phones

    Calling made modern. Your business number. Your employees' phones. Our amazing features. A dial menu spoken by our voice actors. Callers press numbers to make purchases, hear MP3s, connect to specific staff, and more. Make and answer calls using your number on multiple phones without the caller ever knowing. Employees hear secret in-house menus, transfer calls, and send voicemails to their email, all from their dialpad. These business features require no new software or hardware. Your dialpad come to life. Porting your business or personal number at the press of a button. Select from our menu of modern voice features for your business or personal line. We'll activate these features on your current phone for you. No work (or learning) required from you. We'll be here to transform your number whenever your desires change.
    Learn More
  • AI-Powered Identity Governance Icon
    AI-Powered Identity Governance

    For IT Teams and MSPs in need of a solution to simplify, optimize and secure their SaaS, file, and device management operations

    Define governance policies, manage access, and optimize licenses with unified visibility across every identity, app, and file.
    Learn More
  • 1
    pyhanlp

    pyhanlp

    Chinese participle

    pyhanlp is a Python interface for HanLP (Han Language Processing) that lets you use a mature Java-based NLP toolkit from Python workflows without rebuilding the underlying algorithms. It is commonly used for Chinese-language NLP tasks where you want production-grade tokenization and linguistic analysis, but still want the convenience of Python scripting. The project focuses on making HanLP’s capabilities accessible through a Python-friendly API surface, so you can integrate NLP steps into...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Bin Packing with Genectic Algorithm

    Bin Packing with Genectic Algorithm

    Bin Packing problem solved using Genectic Algorithm

    This project contains a solution for a Bin Packing problem solved using Genectic Algorithms. The code in the project was created as a solution for a problem in a combinatorial optimization class at the Univeridade Federal do Rio Grande do Sul (UFRGS - Brasil) in 2007.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 3

    Sorting Algorithms

    An educational demo of how sorting algorithms work.

    This is a small Java swing application that shows different sorting algorithms working on the same set of data. The user can modify the speed of execution and the type of data to sort and execute it step by step. The tooltip of each algorithm's box shows the source code that is executed and a little explanation got from wikipedia. This application is aided to computer science students who want to better understand how the algorithms work.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Tpl makes it easy to serialize your C data using just a handful of API functions. The data is stored in its native binary form for maximum efficiency. C, Perl and XML supported. Data is portable across CPU types and OS's from Unix to Mac to Windows.
    Downloads: 1 This Week
    Last Update:
    See Project
  • Attack Surface Management | Criminal IP ASM Icon
    Attack Surface Management | Criminal IP ASM

    For security operations, threat-intelligence and risk teams wanting a tool to get access to auto-monitored assets exposed to attack surfaces

    Criminal IP’s Attack Surface Management (ASM) is a threat-intelligence–driven platform that continuously discovers, inventories, and monitors every internet-connected asset associated with an organization, including shadow and forgotten resources, so teams see their true external footprint from an attacker’s perspective. The solution combines automated asset discovery with OSINT techniques, AI enrichment and advanced threat intelligence to surface exposed hosts, domains, cloud services, IoT endpoints and other Internet-facing vectors, capture evidence (screenshots and metadata), and correlate findings to known exploitability and attacker tradecraft. ASM prioritizes exposures by business context and risk, highlights vulnerable components and misconfigurations, and provides real-time alerts and dashboards to speed investigation and remediation.
    Learn More
  • 5
    Application provide indexing and searching capability using Inverted File & TVSM methods. Also provide native integration with UNIX based indexing service also GoogleBase & YouTube search via Atom feeds.
    Downloads: 0 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • Next
MongoDB Logo MongoDB