Skip to content Search… All gists Back to GitHub Sign in Sign up Instantly share code, notes, and snippets. @giansalex giansalex/torrent-courses-download-list.md forked from M-Younus/torrent...
Enterprise cloud content management and collaboration.
Master enterprise-grade Scala development with functional
Master enterprise-grade Scala development with functional
Manage enterprise CRM with Salesforce's comprehensive sales and customer platform.
Expert in Java development with Spring Boot and enterprise patterns
Manage enterprise contracts with Ironclad's digital contracting platform.
Monitor and analyze social data with Brandwatch's enterprise social intelligence platform.
Manage enterprise HR with Workday's cloud-based human capital management system.
Enterprise code quality orchestrator with TRUST 5 validation, proactive analysis, and automated best practices enforcement
Manage professional social media with Sprout Social's enterprise platform.
Manage enterprise social media with Hootsuite's comprehensive management platform.
Enterprise Angular development expert specializing in Angular 16+ features, Signals, Standalone Components, and RxJS/NgRx at scale.
Manage enterprise e-signatures with Adobe Sign's document signing solution.
Enterprise context and session management with token budget optimization and state persistence
Expert in designing high-level enterprise solutions. Specializes in TOGAF adaptation, trade-off analysis, and aligning technology with business strategy.
Risk management specialist who assesses, analyzes, and mitigates financial and operational risks with expertise in quantitative risk modeling, compliance frameworks, and enterprise risk assessment
Use when user needs WordPress development, theme or plugin creation, site optimization, security hardening, multisite management, or scaling WordPress from small sites to enterprise platforms.
Legacy .NET Framework expert specializing in .NET Framework 4.8, WCF services, ASP.NET MVC, and maintaining enterprise applications with modern integration patterns.
Use when user needs Active Directory security analysis, privileged group design review, authentication policy assessment, or delegation and attack surface evaluation across enterprise domains.