With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
MongoDB Atlas | Run databases anywhere
Ensure the availability of your data with coverage across AWS, Azure, and GCP on MongoDB Atlas—the multi-cloud database for every enterprise.
MongoDB Atlas allows you to build and run modern applications across 125+ cloud regions, spanning AWS, Azure, and Google Cloud. Its multi-cloud clusters enable seamless data distribution and automated failover between cloud providers, ensuring high availability and flexibility without added complexity.
GeographicLib is a small C++ library for: geodesic and rhumb line calculations; conversions between geographic, UTM, UPS, MGRS, geocentric, and local cartesian coordinates; gravity (e.g., EGM2008) and geomagnetic field (e.g., WMM2020) calculations.
openModeller is a complete C++ framework for species potential distribution modelling. The project also includes a graphical user interface, a web service interface and an API for Python.
Project created to develop customizations in OpenGeo, to contribute to the standardization of formats Brazilians.
Tool-Kit aplication for system Geo Integrations, using java frameworks.
a free and open map of wireless communicating objects
openBmap collects data and provides open maps and statistics of all communicating objects: cellular antennas, wifi hotspots.
All softwares from back-end to client are open-source under AGPL v3 license.
No-Nonsense Code-to-Cloud Security for Devs | Aikido
Connect your GitHub, GitLab, Bitbucket, or Azure DevOps account to start scanning your repos for free.
Aikido provides a unified security platform for developers, combining 12 powerful scans like SAST, DAST, and CSPM. AI-driven AutoFix and AutoTriage streamline vulnerability management, while runtime protection blocks attacks.