Transform Data in Your Warehouse. Build trusted data products faster.
Accelerate your data transformation process with dbt Cloud and start delivering data that you and your team can rely on. dbt enables data analysts and engineers to transform their data using the same practices that software engineers use to build applications. Analysts using dbt can transform their data by simply writing select statements, while dbt handles turning these statements into tables and views in a data warehouse.
Data Observability Platform for Modern Data Teams. Trust the data that powers your business.
Automated end-to-end data observability — so data teams are the first to know about data issues.
Real time estimation of France SNCF company trains position
Handy online tools for developers. Collection of handy online tools for developers, with great UX.
Text-driven, intelligent restoration, blending AI technology with creativity to give every image a brand new life. Scaling Up to Excellence: Practicing Model Scaling for Photo-Realistic Image Restoration In the Wild.
SUPIR aims at developing Practical Algorithms for Photo-Realistic Image Restoration In the Wild.
Spécialisé analyse de sites et recherches de mots clés.
French SemRUSH alternative
Learning-by-Doing Platform to master Cloud Native craft. Training Challenges for Building DevOps and SRE Skills.
Build services that earn trust.
IF curates this catalogue to help teams design trustworthy services that work for people. Contact IF for workshops about how to use these patterns.
Check Shortcuts of 101 Apps.
Designing keyboard shortcuts for your app can be a daunting task. High consistency with other tools is key to ensuring a minimal learning curve for your users. Shortcuts should also be conflict free with the system shortcuts to spare your users of rage when they accidentally try to print your app. Keycheck enables you to find the right shortcuts for your app in seconds.
NPM Dependency Diagrams. A tool for exploring NPM modules and dependencies.
Open source API development ecosystem.
Personal Security Checklist. Your guide to securing your digital life and protecting your privacy.
🔒 A compiled checklist of 300+ tips for protecting digital security and privacy in 2024.
The Frontpage of Teams Knowledge. Save and share your team's curation.
Unlock the power of streamlined knowledge management with Digest Club, the solution for teams looking to centralize their information gathering, sharing, and curation. Say goodbye to scattered bookmarks, disjointed Slack conversations, and missed opportunities to showcase your expertise.
Each entry has about 42 bits of randomness. Queries are not recorded. Randomness is probably as good as the random resource in the operating system.
Search Evasion Techniques.
Malware authors spend a great deal of time and effort to develop complex code to perform malicious actions against a target system. It is crucial for malware to remain undetected and avoid sandbox analysis, antiviruses or malware analysts. With this kind of techniques, malware are able to pass under the radar and stay undetected on a system. The goal of this free database is to centralize the information about malware evasion techniques.
This project aims to provide Malware Analysts and Defenders with actionable insights and detection capabilities to shorten their response times.