With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Go from Code to Production URL in Seconds
Cloud Run deploys apps in any language instantly. Scales to zero. Pay only when code runs.
Skip the Kubernetes configs. Cloud Run handles HTTPS, scaling, and infrastructure automatically. Two million requests free per month.
A 3-channel fully automated Dew Controller (DIY project) based on Arduino Nano for telescopes. For $48 or less.
(c) Copyright Robert Brown 2014-2025. All Rights Reserved.
Permission is granted for personal and Academic use only. Code or portions of code may not be copied or used without appropriate credit given to author.
A very popular project with over 48,000 downloads.
There is a new ESP32 WiFi version at https://sourceforge.net/projects/esp32-dew-controller/
The older...
Input Control is a project to allow users to create and play back logs of their play sessions on retro game consoles that use serial communication controllers. Only SNES is supported in the current version, but future updates can be expanded to most types of consoles. Firmware and some code originally based on jaburn's NintendoSpy project, but it has changed a lot for consistency and otherwise.
Home Automation project, mostly heating and ventilation controls.
Controls running on Single Board Computers.
Framework allowing control simulation and testing.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.