Quick DeepL Translator Plugin for WordPress is a breaking edge translation form embedder plugin. It will use a Gutenberg block or a shortcode to add a form that will allow your visitors to translate texts from a language to another!
It uses the DeepL API, to achieve this. DeepL trains artificial intelligence to understand and translate texts. Neural networks used by DeepL expand human possibility, overcome language barriers, and can bring cultures closer together!
The DeepL API is accessible with a DeepL Pro subscription. The API is an interface that allows this plugin to send texts to the DeepL servers and to receive high-quality translations.
Quick DeepL Translator WordPress Plugin – CodeRevolution 1.0.3
Description
Version Log
Additional Content
Support
We provide technical support for Quick DeepL Translator WordPress Plugin – CodeRevolution through our community forums. Do you need support? Visit this link and post your issue!
Continue the discussion at meta.festingervault.com
Download Options
- Quality checked by our team
- Original file and 100% safe
- Technical support included
VirusTotal Scan Report
…
/…
Scanning…
This file is currently being scanned.
Details
Version
1.0.3
Status
Last Updated
Published
Downloads
–
Views
121
Demo Content
Yes
Original License
No
Original License
No
Files included
No files included found
Tags
No tags found.
Please update Quick DeepL Translator WordPress Plugin – CodeRevolution 1.0.3 to 1.0.3.1… @Steve
Hi gyurci,
We would LOVE to update to its latest version, but we encountered an issue with the activation with its latest version. We’re unable to bypass the security in its latest version, as it’s making a lot of server API calls. We will update the file as soon as possible once we got a solution for this.
Please read this topic for more information:
Please update Quick DeepL Translator WordPress Plugin – CodeRevolution 1.0.3 to 1.0.3.1. @Steve
Hi gyurci,
We would LOVE to update to its latest version, but we encountered an issue with the activation with its latest version. We’re unable to bypass the security in its latest version, as it’s making a lot of server API calls. We will update the file as soon as possible once we got a solution for this.
Please read this topic for more information: