With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
MongoDB Atlas | Run databases anywhere
Ensure the availability of your data with coverage across AWS, Azure, and GCP on MongoDB Atlas—the multi-cloud database for every enterprise.
MongoDB Atlas allows you to build and run modern applications across 125+ cloud regions, spanning AWS, Azure, and Google Cloud. Its multi-cloud clusters enable seamless data distribution and automated failover between cloud providers, ensuring high availability and flexibility without added complexity.
A generator of DTO, Model, and DAO classes to access relational DB
SQL DAL Maker is a generator of DTO, Model, and DAO classes to access relational databases. Target programming languages: PHP, Java, C++, Python, and Go. To generate the class, you declare it in XML meta-program.
At the stage of code generation, the target database must exist and be available for JDBC connection. Generated code is being synchronized with the current database schema using "live" JDBC metadata.
Written in Java. Implemented as plug-ins
For Eclipse: https...
CAM XML Editor for XML+JSON+Hibernate+SQL Open-XDX sponsored by Oracle
..., & OASIS modes) + JAXB bindings; Mindmap FreeMind or UML models(XMI); XML unit test & live SQL data; HTML docs + spreadsheets (NIEM IEPDs). Canonical component dictionaries from schema sets, SQL, JSON, ERwin XSD, or spreadsheets.
The XML CAM templates (OASIS standard) store the exchange structure, content model, code lists, DBMappings, SQL lookups+business rules (XPath). Java CAMV XML/JSON validation engine is a complete exchange test framework [XMLUnit, TEAM(Schematron)].
Java/Eclipse +Saxon/XSL
The “RDB2RDF Mapper” is a Java based software desktop application which allows a user to create a mapping file between a relational database and an RDFS/OWL ontology via a graphical user interface. This project is ANDS-funded.
This project is a java web application developer toolbox. It is among other, a simple and powerful framework which does not require dealing with XML files. It also provides a lot of other features, such as a DB abstraction layer, a nice javadoc doclet, a
Fastly's edge cloud platform delivers faster, safer, and more scalable sites and apps to customers.
Ensure your websites, applications and services can effortlessly handle the demands of your users with Fastly. Fastly’s portfolio is designed to be highly performant, personalized and secure while seamlessly scaling to support your growth.
A Python script to convert Dia XML files storing a UML diagram into SQL create statements. Ideal for designing a database with Dia and creating it on MySQL or PostgreSQL.
KML is a knowledge base with support of logical modeling. Advanced model is used to represent knowledge as a set of statements similar to natural language sentences. This project hosts a set of model storage library and server (vrb-ols) and clients.
A complete, fast, previously commercial, JDO 1.0.1 implementation for databases, opened by Versant in 2005 and then abandoned in early 2006. The design-time code is already in Eclipse Dali. This project is the original source drop, including the runtime.
A WYSIWYG database modeling tool based on eclipse,it can generate code for hibernate,ojb,ibatis,openJpa.The supported platform includes oracel,db2,mysql,mssql,sybase,derby,MaxDB,SapDB,PostgreSql,HsqlDB and the databases which has JDBC driver.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.