DKPro WSD provides UIMA components which encapsulate corpus readers, linguistic annotators, lexical semantic resources, WSD algorithms, and evaluation and reporting tools. You configure the components, or write new ones, and arrange them into a data processing pipeline. DKPro WSD is modular and flexible. Components which provide the same functionality can be freely swapped. You can easily run the same algorithm on different data sets, or test several different algorithms on the same data set.
Apache uimaFIT provides Java annotations for describing UIMA components which can be used to directly describe the UIMA components in Java code without the need for traditional UIMA XML descriptors. This greatly simplifies refactoring a component definition (e.g., changing a configuration parameter name). It also makes it easy to instantiate UIMA components without using XML descriptor files by providing convenient factory methods. It is ideal for testing UIMA components because the component can be easily instantiated and invoked without requiring a descriptor file to be created first.
The ABOUT tool and ABOUT files provide a simple way to document the provenance (origin and license) and other important or interesting information about third-party software components that you use in your project. The tool is a command line based utility. The ABOUT tool helps automate OSS compliance that is needed throughout the software lifecycle.
LightAdmin speeds application development by bringing a pluggable, fully operational data management backend to JPA-based applications and relieving your codebase for more important things. It allows developers to define a data management backend with POJOs and JPA and customize it using simple Domain-specific language.
Jumblar is a tool that converts map coordinates into passwords. It hopes to provide increased user security by assuming that it is easier for people to remember a secret location than a strong password, and that a location that could be anywhere in the world is practically impossible for others to guess. By using this property of secret locations, secure passwords can be generated. SCrypt is used to protect user information.