With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Cloud tools for web scraping and data extraction
Deploy pre-built tools that crawl websites, extract structured data, and feed your applications. Reliable web data without maintaining scrapers.
Automate web data collection with cloud tools that handle anti-bot measures, browser rendering, and data transformation out of the box. Extract content from any website, push to vector databases for RAG workflows, or pipe directly into your apps via API. Schedule runs, set up webhooks, and connect to your existing stack. Free tier available, then scale as you need to.
An Evaluation Framework for Adaptive Scalable Video Streaming
SVCEval-RA is a simulation framework for rate-adaptive video transmission using the Scalable Video Coding standard (H.264/SVC). Our approach uses feedback information about the available bandwidth to allow the video source to select the most suitable combination of SVC layers for the transmission of the video sequence. The proposed solution has been integrated into the network simulator NS-2 in order to support realistic network simulations.
DSR-UU is an implementation of the Dynamic Source Routing protocol that runs in the Linux kernel or in the ns-2 network simulator. It was originally created at Uppsala University, hence the UU.
QUENAS (QUeued Event Network Automatic Simulator) is a Network Simulator that enables to create a network of nodes and simulate communications between then. Currently, the Hypercube protocol is implemented at network layer.
All-in-one security tool helps you prevent ransomware and breaches.
SIEM + Detection and Response for IT Teams
Blumira’s detection and response platform enables faster resolution of threats to help you stop ransomware attacks and prevent data breaches. We surface real threats, providing meaningful findings so you know what to prioritize. With our 3-step rapid response, you can automatically block known threats, use our playbooks for easy remediation, or contact our security team for additional guidance. Our responsive security team helps with onboarding, triage and ongoing consultations to continuously help your organization improve your security coverage.
The aim of this project is to have a current implementation of the experimental VFER protocol (http://vfer.sf.net) within the ns-2 network simulator. The design of VFER can then be tweaked using results from this simulation.