216,000+ customers in over 135 countries grow their businesses with HubSpot
HubSpot is an AI-powered customer platform with all the software, integrations, and resources you need to connect your marketing, sales, and customer service. HubSpot's connected platform enables you to grow your business faster by focusing on what matters most: your customers.
Get started free
Auth0 Free: 25K MAUs + 5-Min Setup
Enterprise Auth, Zero Friction: Any Framework • 30+ SDKs • Universal Login
Production-ready login in 10 lines of code. SSO, MFA & social auth included. Scale seamlessly beyond free tier with Okta’s enterprise security.
Tool for chess teachers to create PDF files with chess diagrams in it
Tool for chess teachers to create PDF files with chess diagrams in it.
1) Create a pgn file with chess diagrams (FEN notation) in it (e.g by using lichess)
2) Open the Fen2Pdf and select the folder containin the pgn(s)
3) Click start. Fen2Pdf detects the pgn files in it and creates a pdf file
You can now print this file and hand the exercises over to your students
Acoma process email communication on server or desktop side and attach relevant information from various sources to an email messages. It can be used within any email client or mobile device since it is hooked up to email as a proxy to SMTP or POP3.
JPACS, Java Processor and Cache Simulator, was developed to give a simple and clear tool to simulate a processor with a complete associative memory cache at ISA level, using direct memory access or using a program written in assembly.
Trusted by nearly 20,000 customers worldwide, and all major cloud providers.
OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
Simulating Cache based Checkpointing and Rollback schemes are currently performed only at the hardware level for the lack of such simulation software that is generic. NCkptSimulator, a simulation tool, will support different checkpointing schemes
Enables a user to view & alter
all aspects of comunications with a web site via a proxy. Primarily used for security
based penetration testing of web sites, it can also be used for
debugging during development. Seen as part of a hacker toolkit.