With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Build Securely on AWS with Proven Frameworks
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
music composition and notation software, audio to midi converter
Jniz is a piece of software designed for musicians as a support tool to the musical composition.
It allows you to build and to harmonize several voices according to the rules of classical harmony.
Sound/audio-to-Midi converter: real-time conversion of any monophonic sound (voice, instrument etc.) into notes / tones.
Jniz is a free proprietary piece of software. You do not have the right to sell, distribute Jniz or use its sources under penalty of law. You will infringes on the Jniz staff...
This is a chess program to help you to organize any chess tournaments
This is a chess program to help you to organize any chess tournaments without using real chess rules, go to the support page of this program. The support page also has more information about this program.
This program creates a "Data" folder to save settings of this program and notes of tournaments and players.
Players could play with each other on a single device or playing by multiple devices by a network.
This program shows squares that mouse points on them and that helps to prevent any...
A puzzle game of rules acting upon rules. Create the desired pattern.
...
First created with NeXT Interface Builder and Objective-C files (1995, Mach OS): rulerule.gz (Creative Commons Attribution License). For some history, see
http://hilgemeier.gmxhome.de/codes/rulerule.htm
Unfinished Java project, running under Eclipse Luna with Windows 7 (2012, LGPL). Contains notes and design diagrams for possible future development. Doxygen-documented : RuleRule2.00_working.zip
ASRemind is a desktop reminder application that links to a user's Google Calendar's entries and reminds them of upcoming activities. It also allows a user to enter notes on the various activities that a user is doing.
Focus on your application, and leave the database to us
Fully managed, cost-effective relational database service for PostgreSQL, MySQL, and SQL Server. Try Enterprise Plus edition for a 99.99% availability SLA and category-leading performance.
You own a Pegasus NoteTaker hardware based digital pen ? You only use Linux or Solaris ? Now, there is an alternative ! (Compatible with IRIS Notes, Dane-Elec magic pen and others).
Drivers and application are provided !
J-Bird is a database system for recording observations of birds and other organisms over time. To birders, it is listing software. J-Bird is suitable for maintaining bird lifelists and field notes.
Modular Eclipse RCP application to store personal Information like Contacts, Passwords, Notes, ... Initially What? is not intended to share information over a network, but to keep all information in an in-memory-database.
InfoPad is a utility to store short notes and other information. It includes a simple search function and is synchronizable over the internet. We are especially interested in making this software intuitive and easy to use.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.