Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Sign Up Free
$300 in Free Credit Towards Top Cloud Services
Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
Modular, touch screen friendly navigation system with GPS tracking, realtime routing engine and support for various vector map formats. Works on a wide range of devices, from computers to smartphones.
Operating System :
Windows - Linux - Mac OS
Drawing CAD 2D
Point Line Polygon Rectangle Circle Ellipse Texte
Labeling Point Line Polygon Rectangle Circle
(Name Code Comment XYZ Length Angle Area Radius ...)
Area Calculation by points or by object.
Import-Export module :
Image bmp,jpg,png
CSV TXT SVG DXF R12 SOKKIA SDR33
TOPCON FC4 GTS7 XML LANDXML
LEICA GSI8 GSI16
a free and open map of wireless communicating objects
openBmap collects data and provides open maps and statistics of all communicating objects: cellular antennas, wifi hotspots.
All softwares from back-end to client are open-source under AGPL v3 license.
This application is made for the passenger of taxi, passenger's family and taxi driver. Though it is not a complete, because my team has responsibility to open our sources, we had decided submit our sources to sourceforge.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.