With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
AlisQI is a modular, cloud-based Quality Management platform for process and batch manufacturers
Manufacturing verticals: Chemicals, Textiles, Personal Hygiene, Food & beverage, Plastics, Paper and Packaging, Automotive and Manufacturing.
By bringing lab, quality, and production data together into one source of truth, AlisQI helps teams across the organization spot issues earlier, resolve them faster, and keep operations running profitably.
IIOP.NET allows a seamless interoperation between .NET, CORBA and J2EE distributed objects. This is done by incorporating CORBA/IIOP support into .NET, leveraging the remoting framework.
Joone is a neural netframework written in Java(tm). It's composed by a core engine, a GUI editor and a distributed training environment and can be extended by writing new modules to implement new algorithms or architectures starting from base component
mDNS.NET is an implementation of the Multicast DNS (mDNS) protocol (also known as Rendezvous) for service registration and discovery on a local network in the C# language. mDNS.NET is designed for both the Microsoft .NETFramework and the mono framework.
RAFT-Net is a Fault Tolerant Parallel Distributed Framework.
Using a Master-Worker scheme, the framework transparently
distributes workunits to workers (drones). These workers can join and
leave and as such, the network is very flexible. A modified
Discover the cyber platform that secures and insures SMEs
In a world that lives and breathes all things digital, every business is at risk. Cybersecurity has become a major problem for small and growing businesses due to limited budgets, resources, time, and training. Hackers are leveraging these vulnerabilities, and most of the existing cybersecurity solutions on the market are too cumbersome, too complicated, and far too costly.