Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Try Google Cloud Risk-Free With $300 in Credit
No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
AContent is a free web content authoring tool and repository used for developing and sharing accessible, adaptable elearning content. Import and export IMS Common Cartridges, Content Packages, QTI Tests, and AccessForAll adapted content.
Web based archiving system for community radio stations. Includes podcasting, xml indexes, complete control over accessibility of content. Programmers can place descriptions of individual shows. Administrator can control downloadability, whether podcast.
Allows approved users to build a virtual streaming station from mp3's. Generates web page for each user plus master page. Streams, playlist and podcast for each Virtual Program Director. Allows control of content by root user(s). Uses Ices and Icecast.
PAT is a complete web application that allow to manage files (basic and advanced functions like compression in gz), ftp, and database all in one. Designed to reproduce a Graphical User Interface (GUI) with drop-down and context menu for easy use
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.