With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
Scientific, Engineering and Statistical Graphing data extraction tool
Graphixy is a freeware and lighter (140 KB) standalone program designed to get 'x' and 'y' graphical co-ordinates of an image in scientific, engineering & statistical applications and in image data processing.
By drawing an image (or) hovering mouse over the pre-loaded image (using Load option), the 'x' and 'y' co-ordinates can be recorded and saved as notepad .txt file
The saved data can be exported to Excel spreadsheet and viewed in graph format.
Drawn images can be replayed from the...
Research tool for interactive training of artificial neural networks.
BNNS is a research tool for interactive training of artificial neural networks based on the Response Function Plots visualization method. It enables users to simulate, visualize and interact in the learning process of a Multi-Layer Perceptron on tasks which have a 2D character. Tasks like the famous two-spirals task or classification of satellite image data.
Ytk is a Tcl/Tk program which adds menus, buttons and features to the basic command line driven Yorick program and language. It also enables usage of all Tcl/Tk widgets and functions including buttons, sliders, checkboxes, and other typical TK widgets to
IT Security and Compliance teams can easily answer who did what, where, and when.
We combine authentication, authorization, connectivity, and observability to create frictionless access management across your company’s entire stack, in a way that admins love. That means secure, that means fast, that means convenient and as flexible and automatable as you need it to be.