With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Atera all-in-one platform IT management software with AI agents
Ideal for internal IT departments or managed service providers (MSPs)
Atera’s AI agents don’t just assist, they act. From detection to resolution, they handle incidents and requests instantly, taking your IT management from automated to autonomous.
An implementation of the Model-View-Controller (MVC) design pattern based on the Jakarta Struts Framework. Includes a core library (Horizon), a servlet container (Stratus), and a Server Pages Engine (Phase). Resembles the J2EE web container environment.
PTLog focuses on pluggability of underlying logging frameworks, type-based categorization and some formatting utility on Logging.
PTLog does not compete against any other logging frameworks, but can co-operate with them as abstraction layer on them.
A tool to monitor and analyse data transmitted between clients
and a server through a TCP connection. This tool focuses on the data stream
(software layer), not on the lower level transmission protocol as
packet sniffers do.
Build lead generation pipelines that pull emails, phone numbers, and company details from directories, maps, social platforms. Full API access.
Generate leads at scale without building or maintaining scrapers. Use 10,000+ ready-made tools that handle authentication, pagination, and anti-bot protection. Pull data from business directories, social profiles, and public sources, then export to your CRM or database via API. Schedule recurring extractions, enrich existing datasets, and integrate with your workflows.
Platform based on JMS queues to centralize System Event Messages (syslog) and Application Layer Messages, persisting them in several Databases and providing several pre- and post- processes according the message's nature, like encryption, mail.