With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
AWK~plus is the next generation script practice environment. The AWK Language specifications and a main extension of GNU GAWK. Combination of Dynamic and Static typing. Parallel computing that a lock is free, and is thread safe at a language level.
LIME (Less-is-More) is parallel/concurrent programming environment based on C. Internally, it uses XML technology to describe tasks and their dependencies. Externally, it offers the ANSI C99 programming as well as a set of visually-oriented interfaces.
A simple, fast, finite state machine (fsm) C code generator using an awk script to read a fsm specification (state, event, action, next state) to produce data for use by included transition function. You provide the fsm spec and the action functions.
Dun and Bradstreet Risk Analytics - Supplier Intelligence
Use an AI-powered solution for supply and compliance teams who want to mitigate costly supplier risks intelligently.
Risk, procurement, and compliance teams across the globe are under pressure to deal with geopolitical and business risks. Third-party risk exposure is impacted by rapidly scaling complexity in domestic and cross-border businesses, along with complicated and diverse regulations. It is extremely important for companies to proactively manage their third-party relationships. An AI-powered solution to mitigate and monitor counterparty risks on a continuous basis, this cutting-edge platform is powered by D&B’s Data Cloud with 520M+ Global Business Records and 2B+ yearly updates for third-party risk insights. With high-risk procurement alerts and multibillion match points, D&B Risk Analytics leverages best-in-class risk data to help drive informed decisions. Perform quick and comprehensive screening, using intelligent workflows. Receive ongoing alerts of key business indicators and disruptions.
WESP is a collection of subtle scripts and programs written in several languages (C, /bin/sh, (g)awk, ruby, icon) that breaths a new life into the WEB system for literate programming by Donald Knuth (and CWEB by Knuth/Sylvio Levy).
Add logger code to all java files recursively from a given directory. If directory is not defined, the current directory is used. System.out.println are defaultly replaced by logger.fine but you can change the lever or do not replace.
The bfi-toolkit is a set of scripts that converts Cobol Copybooks to XML. Uses sed and awk. Conversion allows for transformation of the XML produced, to create useful bits of code using XSLT (Cobol programs, copybook, DB tables etc.)
Code Beautifier is a tool to beautify your code. Make your code more clear and understandable. It intents to support variouse computer languages. Sush as C, C++, Perl, shell, awk, BASIC etc.