Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Sign Up Free
$300 in Free Credit Towards Top Cloud Services
Build VMs, containers, AI, databases, storage—all in one place.
Start your project in minutes. After credits run out, 20+ products include free monthly usage. Only pay when you're ready to scale.
PerfParse. Storage and analysis of binary performance data produced by Nagios. High quality accurate graphs of live data from standard Nagios plugins. Permanent history of plugin results with advanced analysis tools.
A hardware supported hypervisor originally built for malware analysis. Features: Linux VM introspection, minimal detectability, small (~150KB), simple, and well documented. Can be used for other purposes. Support for Intel-VT & Windows coming soon.
A logging shell that can log commands from a shell. Designed to act as an automated lab-book for people that conduct experiments in their standard shell environments. Users can log and re-run experiments with little/no manual effort or interference.
audacity-extra now provides a sleek dark themed version of the Audacity open source sound editor. The project experiments with Audacity variations. There's a vowel-sound target-practice display for language learners and an analog waveform data logger for embedded systems.
This project is a python script to abstract S.M.A.R.T. messages from /var/log/messages (from the smartd daemon) into .csv file(s), one for each disk, suitable for graphing.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
The ProM Import Framework allows to extract process enactment event logs from a set of information systems. These can be exported in the MXML format, which is the standard event log data format for Process Mining analysis techniques.
The Genalyze log analyzer, a simple yet highly extensible framework for parsing log files, was designed for parsing T-Server log files generated by Genesys contact center software platform, yet is generic and easy enough to adapt for other log formats.
The EU Provenance project developed an architecture to document a data generating process in a distributed environment. The Python Client Side Library (CSL) enables the development of provenance-aware Python applications.
The stack tracer is an delphi library for help to make exception handling to informative. The library is written for Delphi 7, but i think will work also on the 5 and 6 versions.
dvbsnoop - DVB analyzer / MPEG analyzer program to monitor, analyze, debug, dump or view dvb/mpeg/dsm-cc/mhp stream information (TS, PES, SECTION) (e.g. digital television) send via satellite, cable or terrestrial.
Moodss is a modular monitoring application, composed of a GUI and a daemon, which supports any device or process for which a module can be developed. Complete dashboards with graphical viewers, thresholds, SQL database archiving, ... can be managed.
Graphical or terminal-based stopwatch with many user-named lap timers. Save / restore timing results via CSV file; timer "runs" even when application isn't running! Supports lap timer label templates. Hildonized (i.e., also runs on Maemo / Nokia 770).
A tool to monitor and analyse data transmitted between clients
and a server through a TCP connection. This tool focuses on the data stream
(software layer), not on the lower level transmission protocol as
packet sniffers do.
Searches arbitrary text input (logs, etc) for regular expression(s) matching, and then executes arbitrary SQL statement(s) with matched substrings used as parameters. Offers daemon, incremental and transactional features.
The Internet Censor is a multi-platform, Internet clustering program, for which the resulting data will be used in the creation of a non-profit content-filtering Internet Search Engine for children.
Frontier Data System is a collection programs for data acquisition and data mining. It uses MySQL and PHP to monitor process variables and performance of shop floor equipment. Produces information on issues such as cycle time, downtime and SPC.
The LibMotionControl combines different serial protocols of external motion controllers to one generic interface. It is already implemented for one DC-motor (Maxon ASCII-protocol) and two stepper motor controllers (AML, Phytron). This are user level driv