Free diagnostic script reveals configuration issues, error patterns, and security risks. Instant HTML report.
Windows Task Scheduler might be hiding critical failures. Download the free JAMS diagnostic tool to uncover problems before they impact production—get a color-coded risk report with clear remediation steps in minutes.
Download Free Tool
AI-generated apps that pass security review
Stop waiting on engineering. Build production-ready internal tools with AI—on your company data, in your cloud.
Retool lets you generate dashboards, admin panels, and workflows directly on your data. Type something like “Build me a revenue dashboard on my Stripe data” and get a working app with security, permissions, and compliance built in from day one. Whether on our cloud or self-hosted, create the internal software your team needs without compromising enterprise standards or control.
An implementation of the Model-View-Controller (MVC) design pattern based on the Jakarta Struts Framework. Includes a core library (Horizon), a servlet container (Stratus), and a Server Pages Engine (Phase). Resembles the J2EE web container environment.
PTLog focuses on pluggability of underlying logging frameworks, type-based categorization and some formatting utility on Logging.
PTLog does not compete against any other logging frameworks, but can co-operate with them as abstraction layer on them.
A tool to monitor and analyse data transmitted between clients
and a server through a TCP connection. This tool focuses on the data stream
(software layer), not on the lower level transmission protocol as
packet sniffers do.
With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Platform based on JMS queues to centralize System Event Messages (syslog) and Application Layer Messages, persisting them in several Databases and providing several pre- and post- processes according the message's nature, like encryption, mail.