Latest version: v1.1.1
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
Implementation of the producer-consumer patternwith customizable producer and consumer methods andan ability to choose thread/process model for execution.
No known vulnerabilities found