With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Compiler of a 0+ order rule system. From a ruleset using attribute value formalism a decision tree is build and java/C/C++ execution code will be generated.
JAVA based tool for easy and realtime monitoring (RTM) of data streams or groups of data streams. This tool makes it easy to monitor inherent distributed or multi-threaded applications like e.g. agent systems, financial data, logistics, RFID Systems
A demonstration of the result of using an agent based approach in software. Shows a swarm of icons representing agents that follow user selected rules.
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
OpenRLL is a Clojure-based, open-source reimplementation of the interesting bits of Russell Greiner and Douglas Lenat's Representation Language Language.
WebAPSEE is an open source project which aims to provide automated support for software process management. The users list is: http://groups.google.com/group/webapsee-usuarios
The goal of this project is to build a very large ontology.
What is intended is a multiple inheritence taxonomy with properties.
Usual ontologies like OpenCyc or ThoughTreasure weights a few megabytes.
The project will build a 100 megabyte ontology.
Identification of biological species via iterational process of giving an ordered set of questions to user. The order is defined by an optimization algorithm, trying to provide the most correct prediction about the questions to ask.
A Checkers game implementation in Java that is optimized for AI's. It includes a basic GUI and a trainer for learning AI's. This started as a Checkers program for a Checkers AI contest in the Stanford EPGY 2008 summer AI course.
SecureJDMS is the attempt to develop a secure DMS, based on an RCP and (even untrusted) DB for data storage. For now, its all about managing scanned documents and searching them by content (using OCR). All data sent and stored will be strongly encrypted.
Augmented Syntax Diagrams are an alternative to natural language grammar rules expressed as strings. They are also suitable for left-corner bottom-up parsing. Prof. Jim Mason developed an editor (ASDEditor) in Java to create and edit ASD grammars.
Projeny (Probablistic Networks Generator in Java) is a graphical (Java SWT) front-end to BNT (Bayes Net Toolbox for Matlab). Projeny requires BNT, JMatLink and a Matlab back-end. There is no installable release package, but source code is available on SVN - please check out from SVN to use Projeny. Projeny was started with BNJ as the base.
POESIA= Public Opensource Environment for a Safer Internet Access
an opensource Internet content filter (multimodal, mulitlingual) aimed for protection of youth (in schools...); partly funded by the European Commission
Security is a subject of major concern in mobile agents. This project provides a security framework that allows the protection of mobile agents from third parties. A self-protected approach, where the agents themselves manage the process, is used.