With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.
You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
Try free now
Grafana: The open and composable observability platform
Faster answers, predictable costs, and no lock-in built by the team helping to make observability accessible to anyone.
Grafana is the open source analytics & monitoring solution for every database.
Syndicate text and multimedia content with this API and storefront.
...The CDC, FDA/CTP, HHS/ASPA, and the National Institute of Health’s National Institute for Allergy and Infectious Diseases (NIH/NIAID) use these platforms.
https://syndication.hhs.gov
http://tools.cdc.gov
http://tools.niaid.nih.gov
http://tools.fda.gov
agorum core is the Document Management System (DMS) with the drive-interface. It allows access to the stored documents with a network share. It offers a wide range of DMS-Functionality:Search,Versioning,Archive,Workflow,... See http://www.agorum.com
Tiny Java RSS / RDF / Atom Aggregator for desktop. Using Thinlet as interface, it's goal is to provide a cross-platform and lightweight feeder. Skins, antialiasing and multi-language support, because news reading needs to be the most pleasant possible!
Andalus is a high availability, fully featured Islamic library written entirely in Java. It is a technology suitable for nearly any application that requires to make use of integrable Islamic resources. http://openandalus.wordpress.com/
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.