Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build, govern, and optimize agents and models with Gemini Enterprise Agent Platform.
Start Free
Our Free Plans just got better! | Auth0
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Small ANSI C lib for dropbox/windows azure communication
...Also contains a small CLI programs that interfaces with the lib.
Also capable of windows azure service bus communications.
See the README.txt for more info.
UDP based file transfer client/server application (based on lib UDT)
Combined client+server UDP based file transfer application. Based on the UDT protocol - via libudt - http://udt.sourceforge.net/
UDT is a reliable UDP based application level data transport protocol. UDT is designed for extremely high speed networks and it has been used to support global data transfer of terabyte sized data sets.
Ne Plus Ultra is built to have extremely minimal dependencies (statically linked against libudt.a) to ensure maximum portability and ease of...
OLAFS is an Open Local Area File Sharing tool. It is written in Java and consists of a peer to peer lib for local area networks and a music player gui. The gui plays shared files from OLAFS users in the LAN no matter where they are physically located.
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Voodoo Exchange Networking Library is a D library that provides a simple API for creating streaming, peer-to-peer TCP connections between two clients, even if they are behind NATs or firewalls, by attempting multiple NAT traversal algorithms.