Access Google's best plus Claude, Llama, and Gemma. Fine-tune and deploy from one console.
Build generative AI apps with Vertex AI. Switch between models without switching platforms.
Start Free
Auth0 B2B Essentials: SSO, MFA, and RBAC Built In
Unlimited organizations, 3 enterprise SSO connections, role-based access control, and pro MFA included. Dev and prod tenants out of the box.
Auth0's B2B Essentials plan gives you everything you need to ship secure multi-tenant apps. Unlimited orgs, enterprise SSO, RBAC, audit log streaming, and higher auth and API limits included. Add on M2M tokens, enterprise MFA, or additional SSO connections as you scale.
Hyperic is application monitoring and performance management for virtual, physical, and cloud infrastructures. Auto-discover resources of 75+ technologies, including vSphere, and collect availability, performance, utilization, and throughput metrics.
Simple command line driven Java program to allow you to record arbitrary events in a MySQL database. E.g. when a machine or a person logged on or off. Just call Makam at appropriate points in your login/logout scripts.
Core library for complex software project development. Features: semaphores, services, finite state machine, framework, utilities related to the middleware architecture and implementation.
A hardware supported hypervisor originally built for malware analysis. Features: Linux VM introspection, minimal detectability, small (~150KB), simple, and well documented. Can be used for other purposes. Support for Intel-VT & Windows coming soon.
This product sniffs web traffic on a Linux/Unix machine and creates log files for each website in CLF, Accrue, or a Verbose format. It can be configured with any IP address/Port Number combination, or it can be configured with domain names or virtual h
JIDD is a platform/Configuration independent installationless desktop environment written in Java.
Allows a complete "installation" of java softwares to be moved from one machine to another and used "as it".
That means your desktop bec
A client/server application designed to let the user monitor a directory
tree on a remote machine by creating snapshots of current file status in order
to later detect file modification, addition and/or removal.