No hidden charges. No surprise bills. Cancel anytime.
Use your credit across every product. Compute, storage, AI, analytics. When it runs out, 20+ products stay free. You only pay when you choose to.
Start Free
Stop Storing Third-Party Tokens in Your Database
Auth0 Token Vault handles secure token storage, exchange, and refresh for external providers so you don't have to build it yourself.
Rolling your own OAuth token storage can be a security liability. Token Vault securely stores access and refresh tokens from federated providers and handles exchange and renewal automatically. Connected accounts, refresh exchange, and privileged worker flows included.
QueLang is a designing tool to use for Questionnaire Design.
This is the first implementation of QueLang. QueLang is a language I designed for Questionnaire Design and Implementation.
This software can compile your code (written in .ql text files) into a special .qlc format (a kind of database). Then it can read those .qlc files to open them in viewer and export them to PDF format.
It can be also used for exam and test designing!
Tested on:
-Linux Ubuntu 12.04
-Windows 7 64-bit
QueLang can run by double clicking the .jar (or .exe)...
Arbol3D is a very simple genealogic program writeen in Java (Spanish). You can edit info (name, sex, dates of birth, death, marriage, etc...) for individuals, add/remove photo, import and export GEDCOM data and more... The program uses a text file as database!
Web-based application (Internet Explorer only client at this time) to manage digital media such as photographs. Facilitates naming, describing with RDF/OWL-based metadata, organizing, using in stories, and sharing sets of resources.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.