One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
GIP est un logiciel destiné à gérer plus efficacement et plus rapidement le dispositif des PPRE au sein d'un établissement scolaire : Informations en temps réels, gestion des groupes/compétences, impressions de contrats, de bilans personnalisés,...
Gisi est un projet maintenu lors du cours de Maintenance par les étudiants de l'IUP ISI de l'Université Paul Sabatier, à Toulouse. Cette application web permet l'interaction entre étudiants, enseignants et personnels de l'administration.
Interface web que facilita la automatización sobre base de datos MySQL de la realización de Planes de Trabajo Individualizados, de acuerdo a la legislación vigente sobre educación en España.
Control and Managment for Schools is a School Management System (SMS) to Control the Students Enrollment , Attendace and Grades mainly for Universities. The first phase provide basic reports.
Web Teaching is a complete package that enables the user to implement a web portal that allows the professor-student interaction. A great variety of functions are provided to the professor and students.
This software is a PHP based parent teacher interview application. It used to be a Java Swing application, however it is currently being remade completely using PHP. It can preferably use MySQL, although it supports storing the data locally on the server
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.