AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Try it Free
Auth0 B2B Essentials: SSO, MFA, and RBAC Built In
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
elementary database files for Java, B+ tree index files, ISAM
Java API to realize quick ISAM (Index Sequential Access Method) functionality for application in the file system. Includes scalable database files w/ space recovery and variable record length, scalable B+Tree index files. Supports file backup and restore. Two package types: one with and one without strong file encryption using Twofish algorithm and state-of-the-art encryption technology.
Lightweight tool for connect to MySQL, Oracle 11g and PostgreSQL DB.
This program can help you to connect to the SQL server and execute queries, inserts, updates, show results, browse through DB schemas, tables.
It has converter from timestamp date to regular date format and vice versa + Backup and Restore of MySQL DB + export to CSV file.
Not need to install, just launch and use.
Program was created with Java 1.7 version, please, use the same version for launch it.
SGBD OO GesDatos desarrollado en Java 5, ODMG 3, arquitectura Cliente/Servidor, Persistencia, Transaccionalidad, Encripcion, Autenticacion, Backup, Recuperacion, OQL y ODL. Desarrollado por el Grupo GESDATOS, U Distriral Francisco Jose De Caldas.
commTee is a system which is used to store informations received from mobile clients (Phone, PND, PDA, ...). The system is able to work with about 10k nodes. Used protocols and technologies: UDP, TCP/IP, Sockets, Java, Hibernate, OSGI
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.