With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
MongoDB Atlas runs apps anywhere
Deploy in 115+ regions with the modern database for every enterprise.
MongoDB Atlas gives you the freedom to build and run modern applications anywhere—across AWS, Azure, and Google Cloud. With global availability in over 115 regions, Atlas lets you deploy close to your users, meet compliance needs, and scale with confidence across any geography.
Draw vector graphics to scale using a descriptive language
Drawj2d creates technical line drawings using a descriptive language. It writes pdf, svg, eps, emf and dxf vector graphics or png images. It runs on all platforms that run Java. It is inspired by Asymptote but with a tcl-like syntax and 2D only.
This object-oriented python module converts 3D VRML models into Collada and integrates it in Google Earth (GE) through the Keyhole Markup Language (KML). It enables the visualisation of large scale aerial/satellite images in the Geo Browser.
MilkCrate utilizes a new open-source markup language for tabular musical notation, and a unique wiki-styled web interface for data input. Users may generate a number of different document types to view the tabular notation, including .png, and PostScript
PyPotrace is a Pythonprogramminglanguage binding for Peter Selinger's Potrace raster to vector conversion algorithm. No separate Potrace library or application required!
No-Nonsense Code-to-Cloud Security for Devs | Aikido
Connect your GitHub, GitLab, Bitbucket, or Azure DevOps account to start scanning your repos for free.
Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.