Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
Download Now
Auth0 B2B Essentials: SSO, MFA, and RBAC Built In
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
A tool to download and configure Voltcraft DL-141TH devices.
This is a Perl application enabling downloading and configuring the Voltcraft DL-141TH temperature and humidity sensors device.
Targeted at Operating Systems supporting libusb.
This application exists thanks to reverse engineering.
Linux based client software and a set of AVR microcontroller devices that support the SportIdent electronic punching system used in orienteering. Clients send card data to a PHP/SQL web application, that serves as full featured event software.
The ADQ project aims to provide device drivers and a terminal based data acquisition and control program for the Meilhaus ME26 data acquisition board and the Meilhaus ME53 relay boards.
The data can also be displayed in real time with a Web page.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.