Libraries for creating shared memory producer/consumer rings. The rings follow the Xen ABI and may be used to create or implement Xen virtual devices.
The tview package implements rich widgets for terminal based user interfaces. The widgets provided with this package are useful for data exploration and data entry.
This module has 3 functions: one to copy files only, one to copy directories only, and one to do either depending on the argument's type.
This package provides a Tryton module that introduces the concept of Purchase Requests which are central points to collect purchase requests generated by other process from Tryton.
This package provides a template for a simple resume or curriculum vitae (CV), in XeLaTeX. This simple template can be further customized or extended, with numerous examples.
An alternative to the @__DIR__ macro. Packages that wish to reference paths in their project directory run into issues with relocatability when used in conjunction with PackageCompiler.
File::Find::Rule::Perl provides methods for finding various types Perl-related files, or replicating search queries run on a distribution in various parts of the CPAN ecosystem.
This package provides an interface to Amazon Web Services security, identity, and compliance services, including the Identity and Access Management (IAM) service for managing access to services and resources, and more.
company-mode back-end for restclient-mode.
It provides auto-completion for HTTP methods and headers in restclient-mode. Completion source is given by know-your-http-well.
This package provides a list of user agents, from a collection of more than 326,000 known user-agents. Users can pick a random one, or select one based on filters.
Nerd Fonts is a project that patches developer targeted fonts with a high number of glyphs (icons). Specifically to add a high number of extra glyphs from popular 'iconic fonts' such as Font Awesome, Devicons, Octicons, and others.
one-more-re-nightmare is a regular expression engine that uses the technique presented in Regular-expression derivatives re-examined (Owens, Reppy and Turon, 2009; doi:10.1017/S0956796808007090) to interpret and compile regular expressions.
This package implements the leaky-bucket rate limit algorithm. It refills the bucket based on the time elapsed between requests instead of requiring an interval clock to fill the bucket discretely.
implements a MsBackend for the Spectra package using Thermo Fisher Scientific's NewRawFileReader .Net libraries. The package is generalizing the functionality introduced by the rawrr package Methods defined in this package are supposed to extend the Spectra Bioconductor package.
Rainbow-delimiters is a "rainbow parentheses"-like mode for Emacs which highlights parentheses, brackets, and braces according to their depth. Each successive level is highlighted in a different color, making it easy to spot matching delimiters, orient yourself in the code, and tell which statements are at a given level.
The datatool-regions bundle provides the language-independent region .ldf files for the datatool package. The region files deal with defining the currency symbol, and may additionally (if not dependent on the language) set the number group and decimal characters, and provide functions for parsing numeric dates and times.
This is a data package that hosts annotated sub-cellular localised datasets from the STOmics, Xenium and CosMx platforms. Specifically, it hosts datasets analysed in the publication Bhuva et. al, 2024 titled "Library size confounds biology in spatial transcriptomics data". Raw transcript detections are hosted and functions to convert them to SpatialExperiment objects have been implemented.
This package adds new RSS generation options to the org-publish-project-alist variable (see the Org manual if you are new to the publishing options). It adds :auto-rss and other options that work similar to the included :auto-sitemap functionality. This should make it easy for users to add RSS feeds to existing Org-based websites.
This module allows libraries to have a dependency to a small module instead of the full Log-Report distribution. The full power of Log::Report is only released when the main program uses that module. In that case, the module using the Optional will also use the full Log::Report, otherwise the dressed-down Log::Report::Minimal version.
This small package modifies the BibLaTeX macro which reads a .bbl file created by Biber. It is thus possible to include a .bbl file into the main document with the environment and send it to a publisher who does not need to run the Biber program. However, when the bibliography changes one has to create a new .bbl file.
U-Boot is a bootloader used mostly for ARM boards. It also initializes the boards (RAM etc).
It allows network booting and uses the device-tree from the firmware, allowing the usage of overlays. It can act as an EFI firmware for the grub-efi-netboot-removable-bootloader. This is a 32-bit build of U-Boot.
This package only contains the file u-boot.bin.
U-Boot is a bootloader used mostly for ARM boards. It also initializes the boards (RAM etc).
It allows network booting and uses the device-tree from the firmware, allowing the usage of overlays. It can act as an EFI firmware for the grub-efi-netboot-removable-bootloader. This is a 32-bit build of U-Boot.
This package only contains the file u-boot.bin.
U-Boot is a bootloader used mostly for ARM boards. It also initializes the boards (RAM etc).
It allows network booting and uses the device-tree from the firmware, allowing the usage of overlays. It can act as an EFI firmware for the grub-efi-netboot-removable-bootloader. This is a common 64-bit build of U-Boot for all 64-bit capable Raspberry Pi variants.
This package only contains the file u-boot.bin.
This package provides a client library for Vipul's Razor. Vipul's Razor is a distributed, collaborative, spam detection and filtering network. Through user contribution, Razor establishes a distributed and constantly updating catalogue of spam in propagation that is consulted by email clients to filter out known spam. Detection is done with statistical and randomized signatures that efficiently spot mutating spam content. User input is validated through reputation assignments based on consensus on report and revoke assertions which in turn is used for computing confidence values associated with individual signatures.