Sha256 algorithm explained online step by step visually.
Sha256 algorithm explained online step by step visually sha256algorithm.com This website will help you understand how a sha256 hash is calculated from start to finish.
Equinox is a space adventure where the story unfolds as you explore and interact with the environment.
This self-initiated project illustrates how our studio can help clients tell their own stories through immersive, interactive experiences, making every engagement memorable and deeply captivating for their audience.
phishing domain scanner.
Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation.
See what sort of trouble users can get in trying to type your domain name. Find lookalike domains that adversaries can use to attack you. Can detect typosquatters, phishing attacks, fraud, and brand impersonation. Useful as an additional source of targeted threat intelligence.
End-of-life (EOL) and support information is often hard to track, or very badly presented. endoflife.date documents EOL dates and support lifecycles for various products.
endoflife.date aggregates data from various sources and presents it in an understandable and succinct manner. It also makes the data available using an easily accessible API and has iCalendar support.
Transform Data in Your Warehouse. Build trusted data products faster.
Accelerate your data transformation process with dbt Cloud and start delivering data that you and your team can rely on. dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Analysts using dbt can transform their data by simply writing select statements, while dbt handles turning these statements into tables and views in a data warehouse.
Data Observability Platform for Modern Data Teams. Trust the data that powers your business.
Automated end-to-end data observability — so data teams are the first to know about data issues.
Real time estimation of France SNCF company trains position
Handy online tools for developers. Collection of handy online tools for developers, with great UX.
Text-driven, intelligent restoration, blending AI technology with creativity to give every image a brand new life. Scaling Up to Excellence: Practicing Model Scaling for Photo-Realistic Image Restoration In the Wild.
SUPIR aims at developing Practical Algorithms for Photo-Realistic Image Restoration In the Wild.
Spécialisé analyse de sites et recherches de mots clés.
French SemRUSH alternative
Learning-by-Doing Platform to master Cloud Native craft. Training Challenges for Building DevOps and SRE Skills.
Build services that earn trust.
IF curates this catalogue to help teams design trustworthy services that work for people. Contact IF for workshops about how to use these patterns.
Check Shortcuts of 101 Apps.
Designing keyboard shortcuts for your app can be a daunting task. High consistency with other tools is key to ensuring a minimal learning curve for your users. Shortcuts should also be conflict free with the system shortcuts to spare your users of rage when they accidentally try to print your app. Keycheck enables you to find the right shortcuts for your app in seconds.
NPM Dependency Diagrams. A tool for exploring NPM modules and dependencies.
Open source API development ecosystem.