With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Automate contact and company data extraction
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Scarlet is an extension for Atlassian JIRA, the leading Enterprise issue tracking and management software, allowing easy clustering of JIRA application instances, ensuring both high availability and linear scalability.
This project is a Web Service based computational grid infrastructure written in Java. Once setup, it allows a user to submit job(s) to the grid to be scheduled for execution on the grid nodes.
This project is setup to maintain a set of Javaparty codes.
This includes Javaparty benchmarks and applications.
Javaparty (http://www.ipd.uka.de/JavaParty/) is a Java extension for easy and efficient parallel programming.
It does so by extending the
The Tiny Grasshopper Cache Store provides a memory based, least recently used (LRU), thread-safe caching mechanism that can openly cache any Java Object. The cache store is easy to use and doesn't require any setup.
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
Designed to allow quick setup of powerful NOW-based clusters to run compute-intensive applications. Applications do not have to be designed specially for these clusters to benefit.