With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Try Google Cloud Risk-Free With $300 in Credit
No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
...You just need
- a modern browser (smartphone, tablet, computer,...) and
- an internet connection.
Main features
- learn (cards due to learn), swat (every card)
- copy cards
- filter
- sort
- synchronize between devices
- share cards with other users (just use all and/or improve and add cards)
Programm code and usage follows the KISS principle, see http://en.wikipedia.org/wiki/KISS_principle
- basic requirement = browser
- OS independent
- no installation required
- no fancy features
- bullet proof synchonization and sharing
- deployment is just copying files onto a PHP enabled webserver
More
- data is on your own server
- no central registration or data mining
Technical Details
- logic in JavaScript (browser)
- Share/synch by PHP scripts on webserver (file based)
Raph Photo Gallery is a web-based photo album manager. It allows to easily and automatically display photo albums. The whole configuration is done through a user-friendly web interface.
phpStat is a set of PHP scripts that can analyze, sort, and generate statistics on IM log files from different clients and store the data in a database
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.